Displaying 20 results from an estimated 80 matches for "eavesdrop".
2007 Aug 27
3
Xen secure display
What solutions are available to provide a completely secure display
system so that users can be sure that what they see on screen is what
they are supposed to see, and that no-one can eavesdrop on what''s being
displayed?
_______________________________________________
Xen-users mailing list
Xen-users@lists.xensource.com
http://lists.xensource.com/xen-users
2007 Aug 27
3
Xen secure display
What solutions are available to provide a completely secure display
system so that users can be sure that what they see on screen is what
they are supposed to see, and that no-one can eavesdrop on what''s being
displayed?
_______________________________________________
Xen-users mailing list
Xen-users@lists.xensource.com
http://lists.xensource.com/xen-users
2004 Aug 13
3
ssh problems
...ationB from my server I get this
error message.
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
@ WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED!
@
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
IT IS POSSIBLE THAT SOMEONE IS DOING SOMETHING NASTY!
Someone could be eavesdropping on you right now
(man-in-the-middle attack)!
It is also possible that the RSA host key has just
been changed.
The fingerprint for the RSA key sent by the remote
host is
55:2e:6a:d8:08:26:7f:cd:f4:1d:36:8f:cf:85:3d:1a.
Please contact your system administrator.
Add correct host key in
/home/diadi...
2020 Sep 16
2
ssh-ed25519 and ecdsa-sha2-nistp256 host keys
...n I try to SSH to the server I get this
error:
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
@ WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED! @
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
IT IS POSSIBLE THAT SOMEONE IS DOING SOMETHING NASTY!
Someone could be eavesdropping on you right now (man-in-the-middle attack)!
It is also possible that a host key has just been changed.
The fingerprint for the ECDSA key sent by the remote host is
SHA256:{redacted}.
Please contact your system administrator.
Add correct host key in /home/ryantm/.ssh/known_hosts to get rid of
t...
2009 Feb 16
1
StrictHostKeyChecking is being ignored
ssh -oStrictHostKeyChecking=no scrub
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
@ WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED! @
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
IT IS POSSIBLE THAT SOMEONE IS DOING SOMETHING NASTY!
Someone could be eavesdropping on you right now (man-in-the-middle attack)!
It is also possible that the RSA host key has just been changed.
The fingerprint for the RSA key sent by the remote host is
4b:c2:f2:a1:ee:f6:b2:01:e1:45:5a:6c:85:d4:ee:94.
Please contact your system administrator.
Add correct host key in /home/iqbal...
2011 Sep 28
1
Fingerprint mismatch upon cvs update
Hello,
a moment ago i got this:
: @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
: @ WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED! @
: @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
: IT IS POSSIBLE THAT SOMEONE IS DOING SOMETHING NASTY!
: Someone could be eavesdropping on you right now (man-in-the-middle attack)!
: It is also possible that the RSA host key has just been changed.
: The fingerprint for the RSA key sent by the remote host is
: 37:ff:ba:69:2c:a5:ec:a0:16:34:9c:2b:0f:c7:2b:6d.
: Please contact your system administrator.
: Add correct host key in /...
2013 Jun 26
0
Is this application possible with Asterisk?
...ted and the next
user in the queue gets connected to the callee. (The user that is
waiting the longest)
7. If a user in waiting mode should get disconnected for whatever
reason, he can redial and enter the PIN to take back his previous
position in the queue.
8. While in waiting mode, every user eavesdrops to the conversation
between the callee and the currently talking user (CHANSPY and/or
CONFBRIDGE LISTEN-ONLY).
9. If the user gets tired of eavesdropping on the conversation and to
make his waiting time more entertaining, he can press a digit while in
waiting mode to enter a conference that is...
2013 Jul 23
1
ECDSA key on anoncvs.mindrot.org
...SSH, I received the following warning:
% cvs up
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
@ WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED! @
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
IT IS POSSIBLE THAT SOMEONE IS DOING SOMETHING NASTY!
Someone could be eavesdropping on you right now (man-in-the-middle
attack)!
It is also possible that a host key has just been changed.
The fingerprint for the ECDSA key sent by the remote host is
d0:46:24:c1:63:cf:6b:f2:e3:33:3d:15:62:08:53:72.
Please contact your system administrator.
Add correct host key in /u/wk/imorgan/....
2004 Jan 05
1
Daemon-mode authentication documentation
...c's authentication mechanism, available only when run in d?mon
mode, is based on a reasonably strong 128-bit MD5 challenge-response
scheme. This is superior to standard FTP authentication for two
reasons. First, passwords are not transmitted over the network and
therefore are not subject to eavesdropping attacks."
This fact is important for people who wish to optimize their transfer
speed and minimize processor load and are not synchronizing sensitive
data (they only wish to protect their username/password). I would
guess that people frequently end up tunneling over ssh when their
se...
2010 Jun 17
2
Ok, I've given up
...e days).
So a few questions for the other esteemed system operators here if you know
the answer I'd love to hear it.
Question 1) Are my user's passwords safe from prying eyes?
First, part of this effort was to move off of an APOP infrastructure into
something more secure against password eavesdropping. To that end I've
configured Dovecot with simply:
protocols = pop3
service pop3-login {
inet_listener pop3s {
port = 995
ssl = yes
}
}
Note that there is NO port = 110 listener and yet Dovecot seems to listen
there anyway. My question, can I be sure that it is not accepting no...
2007 Aug 03
0
"Asterisk can be attacked using buffer overflow."
...e. But they may also be
far more hackable.
Security professionals at the Black Hat conference in
Las Vegas spent Wednesday outlining the exploitable
vulnerabilities in voice over Internet protocol
technology, or VoIP. In a series of presentations,
they demonstrated ways in which cybercriminals can
eavesdrop on VoIP calls, steal data from Internet
telephony devices, intercept credit card numbers from
VoIP connections and shut connections down altogether.
"VoIP is about convergence. The idea is that you save
money and resources and time," said Barrie Dempster, a
senior security consultant at...
2000 Jun 15
0
[RHSA-2000:036-01] New emacs packages available
...2000:036-01
Issue date: 2000-06-15
Updated on: 2000-06-15
Product: Red Hat Linux
Keywords: emacs vulnerability
Cross references: N/A
---------------------------------------------------------------------
1. Topic:
With emacs < 20.7, unprivileged local users can eavesdrop the communication between Emacs and its subprocesses.
2. Relevant releases/architectures:
Red Hat Linux 6.0 - i386 alpha sparc
Red Hat Linux 6.1 - i386 alpha sparc
Red Hat Linux 6.2 - i386 alpha sparc
3. Problem description:
With emacs < 20.7, unprivileged local users can eavesdrop the commu...
2020 Jun 08
3
cdr_mysql: Cannot connect to database server - SSL error: SSL_CTX_set_default_verify_paths failed
Hi list!
I'm getting this error frequently:
ERROR[25193][C-0004f387]: cdr_mysql.c:203 mysql_log: Cannot connect to
database server localhost: (2026) SSL connection error:
SSL_CTX_set_default_verify_paths failed
Right now, as a workaround, I reload Asterisk via cron once an hour, and
after the reload everything is fine again _for a while_. Still, over the
course of a month I lose about
2006 Oct 27
2
Telnet and SSH login problems with Red Hat Enterprise ES4
Hello
We have successfully set up Red Hat Enterprise Linux ES4 and we are now
trying to connect remote clients to connect to it.
The problems we are having are as follows:
a) If we set connect with telnet, we get the login prompt. If we
use any valid login name & password combination (including root), we get
the response "Login incorrect" and then the login prompt comes back.
How
2000 Mar 18
2
Keysize mismatch error on host key
...ith 1048 in
/usr/guest/.ssh/known_hosts, line 1.
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
@ WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED! @
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
IT IS POSSIBLE THAT SOMEONE IS DOING SOMETHING NASTY!
Someone could be eavesdropping on you right now
(man-in-the-middle attack)!
It is also possible that the host key has just been changed.
Please contact your system administrator.
Add correct host key in /usr/guest/.ssh/known_hosts to get
rid of this
message.
Host key for xxx.somewhere.net has changed and you have
requested s...
2002 Apr 10
2
I need to be able to turn off host checking entirely
...get this:
[summer at numbat summer]$ ssh possum
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
@ WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED! @
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
IT IS POSSIBLE THAT SOMEONE IS DOING SOMETHING NASTY!
Someone could be eavesdropping on you right now (man-in-the-middle
attack)!
It is also possible that the RSA host key has just been changed.
The fingerprint for the RSA key sent by the remote host is
22:dc:6b:57:31:b3:0a:3c:07:7e:8d:60:1a:c0:b7:5f.
Please contact your system administrator.
Add correct host key in /home/summ...
2011 Jul 20
1
auto-accept keys matching DNSSEC-validated SSHFP records
...h key changes, but no DNS update
$ ./ssh bishop
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
@ WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED! @
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
IT IS POSSIBLE THAT SOMEONE IS DOING SOMETHING NASTY!
Someone could be eavesdropping on you right now (man-in-the-middle attack)!
It is also possible that the RSA host key has just been changed.
The fingerprint for the RSA key sent by the remote host is
1a:48:3f:2c:54:29:60:c4:86:b9:78:bd:e9:64:1f:8d.
Please contact your system administrator.
Update the SSHFP RR in DNS with the...
2015 Jan 23
0
network copy performance is poor (rsync) - debugging suggestions?
...do get 3 to 4 times
> better performance.
>
> Any hint and suggestion to track that problem down is welcome!
>
Not an expert in rsync/ssh, but I'm pretty sure it's ssh's tcp window size
that is the slowness. ssh is trying to leak the minimal amount of
information to anyone eavesdropping. If speed is your main concern,
http://psc.edu/index.php/hpn-ssh, or rsync to an nfs mount.
2015 Jan 23
1
network copy performance is poor (rsync) - debugging suggestions?
...ormance.
>>
>> Any hint and suggestion to track that problem down is welcome!
>>
>
> Not an expert in rsync/ssh, but I'm pretty sure it's ssh's tcp window
> size
> that is the slowness. ssh is trying to leak the minimal amount of
> information to anyone eavesdropping. If speed is your main concern,
> http://psc.edu/index.php/hpn-ssh, or rsync to an nfs mount.
I'm not certain what the problem could be. But enabling jumbo packets
would be the fist thing I would try, after turning off firewall to test if
it isn't involved. Joining "other advis...
2009 Apr 17
1
[OT] rsa host key change
...ut a
reboot, sshd restart, change in negotiating (SSHv1, SSHv2), and
different DNS name or IP address?
I have a server on RHEL4.4 that changed its host key.
Red Hat Enterprise Linux ES release 4 (Nahant Update 4)
openssh-server-3.9p1-8.RHEL4.15
2.6.9-42.ELsmp
uptime 944 days
Started getting the eavesdropping message from a login that is
supposed to login w/o a password.
And always did before today.