[nycbug-talk] Analyzing malicious SSH login attempts
George Georgalis
george at galis.org
Thu Sep 14 16:16:04 EDT 2006
On Thu, Sep 14, 2006 at 04:03:20PM -0400, George Georgalis wrote:
>On Thu, Sep 14, 2006 at 03:43:24PM -0400, Ray Lai wrote:
>>
>>I don't see the point of hashing your config, unless you really mean
>>encrypting your config, to which I respond: don't specify any hosts in
>>your config!
>>
>
>Well pretty much the only options I have in my config are per host
>configs, ie use identity file a, b or c; port x y or z ; user 1 2
>or 3 and so on. so for the same reason I'd hash known hosts, I'd also
>like to hash (encrypt) config. -- but I've not given much thought
>about implementation, might be difficult/impossible.
on second thought, a one to many hash (one way) might fit the bill.
I know where I'm going, just don't want the config file to show
where I go.
// George
--
George Georgalis, systems architect, administrator <IXOYE><
More information about the talk
mailing list