1996-09-27 - Re: ssh - How widely used?

Header Data

From: “Perry E. Metzger” <perry@piermont.com>
To: Chad Dougherty <chad@lycos.com>
Message Hash: 4e141545ba6ec37f3a2a1e25d1c1a167472e60142b1dbd542f5b2cb85ef4e0bf
Message ID: <199609271552.LAA08679@jekyll.piermont.com>
Reply To: <199609270608.CAA24129@rat.eng.lycos.com>
UTC Datetime: 1996-09-27 19:17:35 UTC
Raw Date: Sat, 28 Sep 1996 03:17:35 +0800

Raw message

From: "Perry E. Metzger" <perry@piermont.com>
Date: Sat, 28 Sep 1996 03:17:35 +0800
To: Chad Dougherty <chad@lycos.com>
Subject: Re: ssh - How widely used?
In-Reply-To: <199609270608.CAA24129@rat.eng.lycos.com>
Message-ID: <199609271552.LAA08679@jekyll.piermont.com>
MIME-Version: 1.0
Content-Type: text/plain



Chad Dougherty writes:
>  > 	Despite all this, I use it, like it, and recomend it for use
>  > in systems not likely to come under attack by professionals.
> 
> Why do you say "not likely to come under attack by professionals"?
> Have you found security holes in it?

Security professionals do not recommend use of systems they feel less
than perfectly comfortable with whether or not they know of specific
holes.

Perry

PS sorry for posting something about a cryptographic security system
in the midst of all the normal talk -- I know its off topic.





Thread