Re: strange log entry
On Thu, May 24, 2001 at 12:09:55PM -0400, Ed Street wrote:
> that's simple ;) If they was stable/non-exploitable then we'd be using rpc
> inplace of ssh ;)
Wha??? There's a difference between exploitable and sniffable. RPC
doesn't use encryption, except for something Sun cooked up with DES. I
don't know the details.
Besides that, ssh has _way_ different uses than RPC. (of course, you could
write a remote shell kind of program using rpc, but why bother? No such
thing exists now, but ssh kicks ass.)
#define X(x,y) x##y
Peter Cordes ; e-mail: X(firstname.lastname@example.org. , ns.ca)
"The gods confound the man who first found out how to distinguish the hours!
Confound him, too, who in this place set up a sundial, to cut and hack
my day so wretchedly into small pieces!" -- Plautus, 200 BCE