search for: eavesdrop

Displaying 20 results from an estimated 80 matches for "eavesdrop".

2007 Aug 27
3
Xen secure display
What solutions are available to provide a completely secure display system so that users can be sure that what they see on screen is what they are supposed to see, and that no-one can eavesdrop on what''s being displayed? _______________________________________________ Xen-users mailing list Xen-users@lists.xensource.com http://lists.xensource.com/xen-users
2007 Aug 27
3
Xen secure display
What solutions are available to provide a completely secure display system so that users can be sure that what they see on screen is what they are supposed to see, and that no-one can eavesdrop on what''s being displayed? _______________________________________________ Xen-users mailing list Xen-users@lists.xensource.com http://lists.xensource.com/xen-users
2004 Aug 13
3
ssh problems
...ationB from my server I get this error message. @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ @ WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED! @ @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ IT IS POSSIBLE THAT SOMEONE IS DOING SOMETHING NASTY! Someone could be eavesdropping on you right now (man-in-the-middle attack)! It is also possible that the RSA host key has just been changed. The fingerprint for the RSA key sent by the remote host is 55:2e:6a:d8:08:26:7f:cd:f4:1d:36:8f:cf:85:3d:1a. Please contact your system administrator. Add correct host key in /home/diadi...
2020 Sep 16
2
ssh-ed25519 and ecdsa-sha2-nistp256 host keys
...n I try to SSH to the server I get this error: @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ @ WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED! @ @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ IT IS POSSIBLE THAT SOMEONE IS DOING SOMETHING NASTY! Someone could be eavesdropping on you right now (man-in-the-middle attack)! It is also possible that a host key has just been changed. The fingerprint for the ECDSA key sent by the remote host is SHA256:{redacted}. Please contact your system administrator. Add correct host key in /home/ryantm/.ssh/known_hosts to get rid of t...
2009 Feb 16
1
StrictHostKeyChecking is being ignored
ssh -oStrictHostKeyChecking=no scrub @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ @ WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED! @ @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ IT IS POSSIBLE THAT SOMEONE IS DOING SOMETHING NASTY! Someone could be eavesdropping on you right now (man-in-the-middle attack)! It is also possible that the RSA host key has just been changed. The fingerprint for the RSA key sent by the remote host is 4b:c2:f2:a1:ee:f6:b2:01:e1:45:5a:6c:85:d4:ee:94. Please contact your system administrator. Add correct host key in /home/iqbal...
2011 Sep 28
1
Fingerprint mismatch upon cvs update
Hello, a moment ago i got this: : @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ : @ WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED! @ : @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ : IT IS POSSIBLE THAT SOMEONE IS DOING SOMETHING NASTY! : Someone could be eavesdropping on you right now (man-in-the-middle attack)! : It is also possible that the RSA host key has just been changed. : The fingerprint for the RSA key sent by the remote host is : 37:ff:ba:69:2c:a5:ec:a0:16:34:9c:2b:0f:c7:2b:6d. : Please contact your system administrator. : Add correct host key in /...
2013 Jun 26
0
Is this application possible with Asterisk?
...ted and the next user in the queue gets connected to the callee. (The user that is waiting the longest) 7. If a user in waiting mode should get disconnected for whatever reason, he can redial and enter the PIN to take back his previous position in the queue. 8. While in waiting mode, every user eavesdrops to the conversation between the callee and the currently talking user (CHANSPY and/or CONFBRIDGE LISTEN-ONLY). 9. If the user gets tired of eavesdropping on the conversation and to make his waiting time more entertaining, he can press a digit while in waiting mode to enter a conference that is...
2013 Jul 23
1
ECDSA key on anoncvs.mindrot.org
...SSH, I received the following warning: % cvs up @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ @ WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED! @ @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ IT IS POSSIBLE THAT SOMEONE IS DOING SOMETHING NASTY! Someone could be eavesdropping on you right now (man-in-the-middle attack)! It is also possible that a host key has just been changed. The fingerprint for the ECDSA key sent by the remote host is d0:46:24:c1:63:cf:6b:f2:e3:33:3d:15:62:08:53:72. Please contact your system administrator. Add correct host key in /u/wk/imorgan/....
2004 Jan 05
1
Daemon-mode authentication documentation
...c's authentication mechanism, available only when run in d?mon mode, is based on a reasonably strong 128-bit MD5 challenge-response scheme. This is superior to standard FTP authentication for two reasons. First, passwords are not transmitted over the network and therefore are not subject to eavesdropping attacks." This fact is important for people who wish to optimize their transfer speed and minimize processor load and are not synchronizing sensitive data (they only wish to protect their username/password). I would guess that people frequently end up tunneling over ssh when their se...
2010 Jun 17
2
Ok, I've given up
...e days). So a few questions for the other esteemed system operators here if you know the answer I'd love to hear it. Question 1) Are my user's passwords safe from prying eyes? First, part of this effort was to move off of an APOP infrastructure into something more secure against password eavesdropping. To that end I've configured Dovecot with simply: protocols = pop3 service pop3-login { inet_listener pop3s { port = 995 ssl = yes } } Note that there is NO port = 110 listener and yet Dovecot seems to listen there anyway. My question, can I be sure that it is not accepting no...
2007 Aug 03
0
"Asterisk can be attacked using buffer overflow."
...e. But they may also be far more hackable. Security professionals at the Black Hat conference in Las Vegas spent Wednesday outlining the exploitable vulnerabilities in voice over Internet protocol technology, or VoIP. In a series of presentations, they demonstrated ways in which cybercriminals can eavesdrop on VoIP calls, steal data from Internet telephony devices, intercept credit card numbers from VoIP connections and shut connections down altogether. "VoIP is about convergence. The idea is that you save money and resources and time," said Barrie Dempster, a senior security consultant at...
2000 Jun 15
0
[RHSA-2000:036-01] New emacs packages available
...2000:036-01 Issue date: 2000-06-15 Updated on: 2000-06-15 Product: Red Hat Linux Keywords: emacs vulnerability Cross references: N/A --------------------------------------------------------------------- 1. Topic: With emacs < 20.7, unprivileged local users can eavesdrop the communication between Emacs and its subprocesses. 2. Relevant releases/architectures: Red Hat Linux 6.0 - i386 alpha sparc Red Hat Linux 6.1 - i386 alpha sparc Red Hat Linux 6.2 - i386 alpha sparc 3. Problem description: With emacs < 20.7, unprivileged local users can eavesdrop the commu...
2020 Jun 08
3
cdr_mysql: Cannot connect to database server - SSL error: SSL_CTX_set_default_verify_paths failed
Hi list! I'm getting this error frequently: ERROR[25193][C-0004f387]: cdr_mysql.c:203 mysql_log: Cannot connect to database server localhost: (2026) SSL connection error: SSL_CTX_set_default_verify_paths failed Right now, as a workaround, I reload Asterisk via cron once an hour, and after the reload everything is fine again _for a while_. Still, over the course of a month I lose about
2006 Oct 27
2
Telnet and SSH login problems with Red Hat Enterprise ES4
Hello We have successfully set up Red Hat Enterprise Linux ES4 and we are now trying to connect remote clients to connect to it. The problems we are having are as follows: a) If we set connect with telnet, we get the login prompt. If we use any valid login name & password combination (including root), we get the response "Login incorrect" and then the login prompt comes back. How
2000 Mar 18
2
Keysize mismatch error on host key
...ith 1048 in /usr/guest/.ssh/known_hosts, line 1. @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ @ WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED! @ @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ IT IS POSSIBLE THAT SOMEONE IS DOING SOMETHING NASTY! Someone could be eavesdropping on you right now (man-in-the-middle attack)! It is also possible that the host key has just been changed. Please contact your system administrator. Add correct host key in /usr/guest/.ssh/known_hosts to get rid of this message. Host key for xxx.somewhere.net has changed and you have requested s...
2002 Apr 10
2
I need to be able to turn off host checking entirely
...get this: [summer at numbat summer]$ ssh possum @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ @ WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED! @ @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ IT IS POSSIBLE THAT SOMEONE IS DOING SOMETHING NASTY! Someone could be eavesdropping on you right now (man-in-the-middle attack)! It is also possible that the RSA host key has just been changed. The fingerprint for the RSA key sent by the remote host is 22:dc:6b:57:31:b3:0a:3c:07:7e:8d:60:1a:c0:b7:5f. Please contact your system administrator. Add correct host key in /home/summ...
2011 Jul 20
1
auto-accept keys matching DNSSEC-validated SSHFP records
...h key changes, but no DNS update $ ./ssh bishop @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ @ WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED! @ @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ IT IS POSSIBLE THAT SOMEONE IS DOING SOMETHING NASTY! Someone could be eavesdropping on you right now (man-in-the-middle attack)! It is also possible that the RSA host key has just been changed. The fingerprint for the RSA key sent by the remote host is 1a:48:3f:2c:54:29:60:c4:86:b9:78:bd:e9:64:1f:8d. Please contact your system administrator. Update the SSHFP RR in DNS with the...
2015 Jan 23
0
network copy performance is poor (rsync) - debugging suggestions?
...do get 3 to 4 times > better performance. > > Any hint and suggestion to track that problem down is welcome! > Not an expert in rsync/ssh, but I'm pretty sure it's ssh's tcp window size that is the slowness. ssh is trying to leak the minimal amount of information to anyone eavesdropping. If speed is your main concern, http://psc.edu/index.php/hpn-ssh, or rsync to an nfs mount.
2015 Jan 23
1
network copy performance is poor (rsync) - debugging suggestions?
...ormance. >> >> Any hint and suggestion to track that problem down is welcome! >> > > Not an expert in rsync/ssh, but I'm pretty sure it's ssh's tcp window > size > that is the slowness. ssh is trying to leak the minimal amount of > information to anyone eavesdropping. If speed is your main concern, > http://psc.edu/index.php/hpn-ssh, or rsync to an nfs mount. I'm not certain what the problem could be. But enabling jumbo packets would be the fist thing I would try, after turning off firewall to test if it isn't involved. Joining "other advis...
2009 Apr 17
1
[OT] rsa host key change
...ut a reboot, sshd restart, change in negotiating (SSHv1, SSHv2), and different DNS name or IP address? I have a server on RHEL4.4 that changed its host key. Red Hat Enterprise Linux ES release 4 (Nahant Update 4) openssh-server-3.9p1-8.RHEL4.15 2.6.9-42.ELsmp uptime 944 days Started getting the eavesdropping message from a login that is supposed to login w/o a password. And always did before today.