> On Tue, 2004-03-16 at 15:37, tickticker wrote: >> How do you give away your combination to anyone sniffing the network? >> Wouldn't they have to sniff the correct ports in the correct order? >> It's more like a password, where each of the chars can be any of 65000 >> possibilities. Much harder to crack than any regular old password > > Austin is right. Anyone sniffing the network will see a common pattern > of traffic just before the SSH connection. If the eavesdropper has a > keen enough eye, it will become obvious what you are doing. > > To address that in my first implementation, I wrote a wrapper script > around sshd that would alter the combination in cd00r.conf after each > ssh session using an arbitrary algorithm that I made up. Didn't matter > what it was as long as I knew how to calculate the next change (and no > one else knew). > > Of course, I am no cryptographer so my simpleton algorithm would be > easily crackable by someone observing my sessions over time. Just added > an extra element of confusion that probably bought me enough time until > I could change the algorithm. Besides, the wrapper also fired an email > to my cellphone anytime someone sent the correct combination of packets > and tickled sshd. > > This, of course, is probably what Austin meant when he said "it starts > getting cumbersome." ;~) > > Unfortunately, I recently rebuilt that box and I never got around to > re-configuring this mousetrap. Now I wish I had saved that code so I > could post it. > How do you have it send messages to your cell phone? That's cool Alex --------------------------------------------------- PLUG-discuss mailing list - PLUG-discuss@lists.plug.phoenix.az.us To subscribe, unsubscribe, or to change you mail settings: http://lists.PLUG.phoenix.az.us/mailman/listinfo/plug-discuss