search for: eavesdropped

Displaying 20 results from an estimated 78 matches for "eavesdropped".

2007 Aug 27
3
Xen secure display
What solutions are available to provide a completely secure display system so that users can be sure that what they see on screen is what they are supposed to see, and that no-one can eavesdrop on what''s being displayed? _______________________________________________ Xen-users mailing list Xen-users@lists.xensource.com http://lists.xensource.com/xen-users
2007 Aug 27
3
Xen secure display
What solutions are available to provide a completely secure display system so that users can be sure that what they see on screen is what they are supposed to see, and that no-one can eavesdrop on what''s being displayed? _______________________________________________ Xen-users mailing list Xen-users@lists.xensource.com http://lists.xensource.com/xen-users
2004 Aug 13
3
ssh problems
Here's another one for ya, I can ssh into my server from workstationB but when I try to ssh into workstationB from my server I get this error message. @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ @ WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED! @ @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ IT IS POSSIBLE THAT SOMEONE IS DOING SOMETHING NASTY! Someone
2020 Sep 16
2
ssh-ed25519 and ecdsa-sha2-nistp256 host keys
Hello. I am running OpenSSH 7.9p1 on my client and server. ssh-keyscan shows the server has ssh-rsa, ssh-ed25519, and ecdsa-sha2-nistp256 host keys. My /etc/ssh/ssh_known_hosts file contains the server's ssh-ed25519 host key. When I try to SSH to the server I get this error: @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ @ WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED!
2009 Feb 16
1
StrictHostKeyChecking is being ignored
ssh -oStrictHostKeyChecking=no scrub @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ @ WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED! @ @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ IT IS POSSIBLE THAT SOMEONE IS DOING SOMETHING NASTY! Someone could be eavesdropping on you right now (man-in-the-middle attack)! It is also possible that the RSA host key has just
2011 Sep 28
1
Fingerprint mismatch upon cvs update
Hello, a moment ago i got this: : @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ : @ WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED! @ : @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ : IT IS POSSIBLE THAT SOMEONE IS DOING SOMETHING NASTY! : Someone could be eavesdropping on you right now (man-in-the-middle attack)! : It is also possible that the RSA host key
2013 Jun 26
0
Is this application possible with Asterisk?
Hi list! Is the following application possible with Asterisk with the default functionality that is currently implemented? 1. User dials in via PSTN / SIP. 2. System announces random but individual PIN to user. 3. If there are no other users, user gets put through to a party by Asterisk dialing out via SIP and the user gets connected to that person. Let's call that person callee. 4. If
2013 Jul 23
1
ECDSA key on anoncvs.mindrot.org
Hello, While running 'cvs up' against the CVS repository for the portable branch of OpenSSH, I received the following warning: % cvs up @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ @ WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED! @ @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ IT IS POSSIBLE THAT SOMEONE IS DOING SOMETHING NASTY! Someone could be
2004 Jan 05
1
Daemon-mode authentication documentation
I have found reference a couple of places on the web describing the details of authentication when rsync'ing with the server in daemon/non-shell mode. For example: http://www.linuxjournal.com/article.php?sid=6508 "rsync's authentication mechanism, available only when run in d?mon mode, is based on a reasonably strong 128-bit MD5 challenge-response scheme. This is superior to
2010 Jun 17
2
Ok, I've given up
Sigh, In the interest of moving forward on this project I've given up trying to get Dovecot to support mailboxes, rather I've tweaked around in qmail and had it deliver into a mail directory on a disk, that isn't NFS mounted. That got me past the various locking complaints and "operation not supported" on home directories that were mounted from the NetApp filer. Going as
2007 Aug 03
0
"Asterisk can be attacked using buffer overflow."
Forbes.com - Magazine Article <http://www.forbes.com/technology/2007/08/02/voip-security-flaws-tech-internet-cx_ag_0802techvoip.html> LAS VEGAS - Internet Security VoIP Vandals Andy Greenberg, 08.02.07, 12:32 AM ET Internet telephone services like Skype and Vonage are starting to look less like digital gimmicks and more like the next generation of voice communication. They're cheaper
2000 Jun 15
0
[RHSA-2000:036-01] New emacs packages available
--------------------------------------------------------------------- Red Hat, Inc. Security Advisory Synopsis: New emacs packages available Advisory ID: RHSA-2000:036-01 Issue date: 2000-06-15 Updated on: 2000-06-15 Product: Red Hat Linux Keywords: emacs vulnerability Cross references: N/A
2020 Jun 08
3
cdr_mysql: Cannot connect to database server - SSL error: SSL_CTX_set_default_verify_paths failed
Hi list! I'm getting this error frequently: ERROR[25193][C-0004f387]: cdr_mysql.c:203 mysql_log: Cannot connect to database server localhost: (2026) SSL connection error: SSL_CTX_set_default_verify_paths failed Right now, as a workaround, I reload Asterisk via cron once an hour, and after the reload everything is fine again _for a while_. Still, over the course of a month I lose about
2006 Oct 27
2
Telnet and SSH login problems with Red Hat Enterprise ES4
Hello We have successfully set up Red Hat Enterprise Linux ES4 and we are now trying to connect remote clients to connect to it. The problems we are having are as follows: a) If we set connect with telnet, we get the login prompt. If we use any valid login name & password combination (including root), we get the response "Login incorrect" and then the login prompt comes back. How
2000 Mar 18
2
Keysize mismatch error on host key
I've got a problem that I'm hoping the list can help with, otherwise ... Heres the problem, I've got OpenSSH 1.2.2p1 running on my Intel Linux box as the secure server. I can connect from another Intel Linux box using scp and it all seems to work fine. Another box tries to connect and it gets a warning about the host keysize not matching. I'm thinking this could be some byte
2002 Apr 10
2
I need to be able to turn off host checking entirely
I have a small LAN. The entire system is within my view - all the hosts, the switch and the wire. If someone is in a a position to do a "man in the middle" attack, there's no need - they already have me. Over the other side of the room, and beside my desk, I have test systems. I use disk caddies (see www.vipower.com for examples) and can switch operating systems in about the
2011 Jul 20
1
auto-accept keys matching DNSSEC-validated SSHFP records
Hi, I submitted a patch back in November of 2009 to add local validation of DNSSEC record to openssh. I recent updated the patch for 5.8, and figured I do a little marketing while I'm at it. :-) Someone had previously submitted a patch which simply trusted the AD bit in the response, which is susceptible to spoofing by anyone who can inject packets between the resolver and the client. Our
2015 Jan 23
0
network copy performance is poor (rsync) - debugging suggestions?
> > I do have two centos 6.6 servers. With a "performance optimized" rsync I > get an speed of 15 - 20 MB/s > > The options I use are: > > rsync -aHAXxv --numeric-ids --progress -e "ssh -T -c arcfour -o > Compression=no -x" > > If I copy files by smb to/from the servers I do get 60 - 80 MB/s, a dd > (r/w) on the storages attached gives 90 MB/s
2015 Jan 23
1
network copy performance is poor (rsync) - debugging suggestions?
On Fri, January 23, 2015 12:54 pm, Patrick Flaherty wrote: >> >> I do have two centos 6.6 servers. With a "performance optimized" rsync I >> get an speed of 15 - 20 MB/s >> >> The options I use are: >> >> rsync -aHAXxv --numeric-ids --progress -e "ssh -T -c arcfour -o >> Compression=no -x" >> >> If I copy files by smb
2009 Apr 17
1
[OT] rsa host key change
Anyone ever come across a linux server host key changing with out a reboot, sshd restart, change in negotiating (SSHv1, SSHv2), and different DNS name or IP address? I have a server on RHEL4.4 that changed its host key. Red Hat Enterprise Linux ES release 4 (Nahant Update 4) openssh-server-3.9p1-8.RHEL4.15 2.6.9-42.ELsmp uptime 944 days Started getting the eavesdropping message from a login