How secure is SSH?
Security is more than a tool, no matter how cool the tool.
"Although several major security compromises are made possible through poor SSH design, does that mean that SSH is a likely target? Consider this: SSH is one of the most attacked services. As the SANS Institute states in its current top 20 vulnerabilities roundup, "Of particular interest this year are attacks against SSH." SSH is rated U1, the top UNIX vulnerability. Why is SSH such a target? In this article, you'll learn why people are implementing SSH on Windows, mainframe, and UNIX devices. We'll explore port forwarding, a cool SSH capability. Then we'll take apart the clever administrator's SSH design, including attacks against key authentication itself.
(Submitted by Noel Mon May 29, 2006 )
Our content can be syndicated: Main page Mac Page
Copyright 1999-2005 Noel Davis. Noel also runs web sites about sailing and kayaking.
All trademarks are the property of their owners.
All articles are owned by their author