[nycbug-talk] Analyzing malicious SSH login attempts

George Georgalis george at galis.org
Thu Sep 14 16:16:04 EDT 2006


On Thu, Sep 14, 2006 at 04:03:20PM -0400, George Georgalis wrote:
>On Thu, Sep 14, 2006 at 03:43:24PM -0400, Ray Lai wrote:
>>
>>I don't see the point of hashing your config, unless you really mean
>>encrypting your config, to which I respond: don't specify any hosts in
>>your config!
>>
>
>Well pretty much the only options I have in my config are per host
>configs, ie use identity file a, b or c; port x y or z ; user 1 2 
>or 3 and so on. so for the same reason I'd hash known hosts, I'd also 
>like to hash (encrypt) config. -- but I've not given much thought
>about implementation, might be difficult/impossible.

on second thought, a one to many hash (one way) might fit the bill.
I know where I'm going, just don't want the config file to show
where I go.

// George


-- 
George Georgalis, systems architect, administrator <IXOYE><



More information about the talk mailing list