new openssh directions
Travis H.
solinym at gmail.com
Wed Dec 28 05:26:42 EST 2005
Interview with OpenSSH developer:
http://www.securityfocus.com/columnists/375
Summary: Arbitrary layer 2/3 tunnelling using tun(4) interfaces over
ssh. Various changes to reduce attack possibilities. My first
encounter with the term "attack surface".
Commentary: TCP over TCP --- retransmit timeout synchrony. Creeping
featurism? Ubiquitous network tunnelling is just a revision away.
This is inevitable.
Aside: I'm currently imagining some kind of network shell that deals
with tunnels between nodes like /bin/sh deals with pipes between
programs.
--
http://www.lightconsulting.com/~travis/
"Vast emptiness, nothing sacred." -- Bodhidharma -><-
GPG fingerprint: 50A1 15C5 A9DE 23B9 ED98 C93E 38E9 204A 94C2 641B
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com
More information about the cryptography
mailing list