Displaying 20 results from an estimated 80 matches for "eavesdropping".
2007 Aug 27
3
Xen secure display
What solutions are available to provide a completely secure display
system so that users can be sure that what they see on screen is what
they are supposed to see, and that no-one can eavesdrop on what''s being
displayed?
_______________________________________________
Xen-users mailing list
Xen-users@lists.xensource.com
http://lists.xensource.com/xen-users
2007 Aug 27
3
Xen secure display
What solutions are available to provide a completely secure display
system so that users can be sure that what they see on screen is what
they are supposed to see, and that no-one can eavesdrop on what''s being
displayed?
_______________________________________________
Xen-users mailing list
Xen-users@lists.xensource.com
http://lists.xensource.com/xen-users
2004 Aug 13
3
ssh problems
...ationB from my server I get this
error message.
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
@ WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED!
@
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
IT IS POSSIBLE THAT SOMEONE IS DOING SOMETHING NASTY!
Someone could be eavesdropping on you right now
(man-in-the-middle attack)!
It is also possible that the RSA host key has just
been changed.
The fingerprint for the RSA key sent by the remote
host is
55:2e:6a:d8:08:26:7f:cd:f4:1d:36:8f:cf:85:3d:1a.
Please contact your system administrator.
Add correct host key in
/home/diadicic/...
2020 Sep 16
2
ssh-ed25519 and ecdsa-sha2-nistp256 host keys
...n I try to SSH to the server I get this
error:
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
@ WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED! @
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
IT IS POSSIBLE THAT SOMEONE IS DOING SOMETHING NASTY!
Someone could be eavesdropping on you right now (man-in-the-middle attack)!
It is also possible that a host key has just been changed.
The fingerprint for the ECDSA key sent by the remote host is
SHA256:{redacted}.
Please contact your system administrator.
Add correct host key in /home/ryantm/.ssh/known_hosts to get rid of
this...
2009 Feb 16
1
StrictHostKeyChecking is being ignored
ssh -oStrictHostKeyChecking=no scrub
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
@ WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED! @
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
IT IS POSSIBLE THAT SOMEONE IS DOING SOMETHING NASTY!
Someone could be eavesdropping on you right now (man-in-the-middle attack)!
It is also possible that the RSA host key has just been changed.
The fingerprint for the RSA key sent by the remote host is
4b:c2:f2:a1:ee:f6:b2:01:e1:45:5a:6c:85:d4:ee:94.
Please contact your system administrator.
Add correct host key in /home/iqbala/.s...
2011 Sep 28
1
Fingerprint mismatch upon cvs update
Hello,
a moment ago i got this:
: @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
: @ WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED! @
: @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
: IT IS POSSIBLE THAT SOMEONE IS DOING SOMETHING NASTY!
: Someone could be eavesdropping on you right now (man-in-the-middle attack)!
: It is also possible that the RSA host key has just been changed.
: The fingerprint for the RSA key sent by the remote host is
: 37:ff:ba:69:2c:a5:ec:a0:16:34:9c:2b:0f:c7:2b:6d.
: Please contact your system administrator.
: Add correct host key in /User...
2013 Jun 26
0
Is this application possible with Asterisk?
...ected for whatever
reason, he can redial and enter the PIN to take back his previous
position in the queue.
8. While in waiting mode, every user eavesdrops to the conversation
between the callee and the currently talking user (CHANSPY and/or
CONFBRIDGE LISTEN-ONLY).
9. If the user gets tired of eavesdropping on the conversation and to
make his waiting time more entertaining, he can press a digit while in
waiting mode to enter a conference that is going on between all users in
waiting mode who entered the conference (CONFBRIDGE).
10. Difficulty: even when currently in a conference, a user must get
a...
2013 Jul 23
1
ECDSA key on anoncvs.mindrot.org
...SSH, I received the following warning:
% cvs up
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
@ WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED! @
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
IT IS POSSIBLE THAT SOMEONE IS DOING SOMETHING NASTY!
Someone could be eavesdropping on you right now (man-in-the-middle
attack)!
It is also possible that a host key has just been changed.
The fingerprint for the ECDSA key sent by the remote host is
d0:46:24:c1:63:cf:6b:f2:e3:33:3d:15:62:08:53:72.
Please contact your system administrator.
Add correct host key in /u/wk/imorgan/.ssh/...
2004 Jan 05
1
Daemon-mode authentication documentation
...c's authentication mechanism, available only when run in d?mon
mode, is based on a reasonably strong 128-bit MD5 challenge-response
scheme. This is superior to standard FTP authentication for two
reasons. First, passwords are not transmitted over the network and
therefore are not subject to eavesdropping attacks."
This fact is important for people who wish to optimize their transfer
speed and minimize processor load and are not synchronizing sensitive
data (they only wish to protect their username/password). I would
guess that people frequently end up tunneling over ssh when their
securi...
2010 Jun 17
2
Ok, I've given up
...e days).
So a few questions for the other esteemed system operators here if you know
the answer I'd love to hear it.
Question 1) Are my user's passwords safe from prying eyes?
First, part of this effort was to move off of an APOP infrastructure into
something more secure against password eavesdropping. To that end I've
configured Dovecot with simply:
protocols = pop3
service pop3-login {
inet_listener pop3s {
port = 995
ssl = yes
}
}
Note that there is NO port = 110 listener and yet Dovecot seems to listen
there anyway. My question, can I be sure that it is not accepting non-SS...
2007 Aug 03
0
"Asterisk can be attacked using buffer overflow."
...He played
snippets of conversations recorded by snooping on VoIP
calls, exploiting vulnerability in a common element in
VoIP communications known as media gateway control
protocol. "Using this weakness in MGCP, you can do
anything like reroute or tear down connections," He
said. "But eavesdropping is especially scary."
Thermos also described an exploitable hole in ZRTP,
one species of the VoIP language real-time transfer
protocol: ZRTP encrypts all transmitted sounds, but
not the numbers translated from tones. That means
hackers can listen for credit card information
communicated from...
2000 Jun 15
0
[RHSA-2000:036-01] New emacs packages available
---------------------------------------------------------------------
Red Hat, Inc. Security Advisory
Synopsis: New emacs packages available
Advisory ID: RHSA-2000:036-01
Issue date: 2000-06-15
Updated on: 2000-06-15
Product: Red Hat Linux
Keywords: emacs vulnerability
Cross references: N/A
2020 Jun 08
3
cdr_mysql: Cannot connect to database server - SSL error: SSL_CTX_set_default_verify_paths failed
Hi list!
I'm getting this error frequently:
ERROR[25193][C-0004f387]: cdr_mysql.c:203 mysql_log: Cannot connect to
database server localhost: (2026) SSL connection error:
SSL_CTX_set_default_verify_paths failed
Right now, as a workaround, I reload Asterisk via cron once an hour, and
after the reload everything is fine again _for a while_. Still, over the
course of a month I lose about
2006 Oct 27
2
Telnet and SSH login problems with Red Hat Enterprise ES4
Hello
We have successfully set up Red Hat Enterprise Linux ES4 and we are now
trying to connect remote clients to connect to it.
The problems we are having are as follows:
a) If we set connect with telnet, we get the login prompt. If we
use any valid login name & password combination (including root), we get
the response "Login incorrect" and then the login prompt comes back.
How
2000 Mar 18
2
Keysize mismatch error on host key
...ith 1048 in
/usr/guest/.ssh/known_hosts, line 1.
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
@ WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED! @
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
IT IS POSSIBLE THAT SOMEONE IS DOING SOMETHING NASTY!
Someone could be eavesdropping on you right now
(man-in-the-middle attack)!
It is also possible that the host key has just been changed.
Please contact your system administrator.
Add correct host key in /usr/guest/.ssh/known_hosts to get
rid of this
message.
Host key for xxx.somewhere.net has changed and you have
requested stric...
2002 Apr 10
2
I need to be able to turn off host checking entirely
...get this:
[summer at numbat summer]$ ssh possum
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
@ WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED! @
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
IT IS POSSIBLE THAT SOMEONE IS DOING SOMETHING NASTY!
Someone could be eavesdropping on you right now (man-in-the-middle
attack)!
It is also possible that the RSA host key has just been changed.
The fingerprint for the RSA key sent by the remote host is
22:dc:6b:57:31:b3:0a:3c:07:7e:8d:60:1a:c0:b7:5f.
Please contact your system administrator.
Add correct host key in /home/summer/....
2011 Jul 20
1
auto-accept keys matching DNSSEC-validated SSHFP records
...h key changes, but no DNS update
$ ./ssh bishop
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
@ WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED! @
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
IT IS POSSIBLE THAT SOMEONE IS DOING SOMETHING NASTY!
Someone could be eavesdropping on you right now (man-in-the-middle attack)!
It is also possible that the RSA host key has just been changed.
The fingerprint for the RSA key sent by the remote host is
1a:48:3f:2c:54:29:60:c4:86:b9:78:bd:e9:64:1f:8d.
Please contact your system administrator.
Update the SSHFP RR in DNS with the new...
2015 Jan 23
0
network copy performance is poor (rsync) - debugging suggestions?
...do get 3 to 4 times
> better performance.
>
> Any hint and suggestion to track that problem down is welcome!
>
Not an expert in rsync/ssh, but I'm pretty sure it's ssh's tcp window size
that is the slowness. ssh is trying to leak the minimal amount of
information to anyone eavesdropping. If speed is your main concern,
http://psc.edu/index.php/hpn-ssh, or rsync to an nfs mount.
2015 Jan 23
1
network copy performance is poor (rsync) - debugging suggestions?
...ormance.
>>
>> Any hint and suggestion to track that problem down is welcome!
>>
>
> Not an expert in rsync/ssh, but I'm pretty sure it's ssh's tcp window
> size
> that is the slowness. ssh is trying to leak the minimal amount of
> information to anyone eavesdropping. If speed is your main concern,
> http://psc.edu/index.php/hpn-ssh, or rsync to an nfs mount.
I'm not certain what the problem could be. But enabling jumbo packets
would be the fist thing I would try, after turning off firewall to test if
it isn't involved. Joining "other advises&q...
2009 Apr 17
1
[OT] rsa host key change
...ut a
reboot, sshd restart, change in negotiating (SSHv1, SSHv2), and
different DNS name or IP address?
I have a server on RHEL4.4 that changed its host key.
Red Hat Enterprise Linux ES release 4 (Nahant Update 4)
openssh-server-3.9p1-8.RHEL4.15
2.6.9-42.ELsmp
uptime 944 days
Started getting the eavesdropping message from a login that is
supposed to login w/o a password.
And always did before today.