|
2001/8/19-22 [Computer/SW/Languages/Java, Computer/SW/Mail] UID:22168 Activity:high |
8/18 I stole the jar for the MindTerm Java SSH client off Soda a long time ago and it has always worked fine. Now, out of the blue i'm getting the mesg.: "Found prieinstalled 'known_hosts' file. Error connecting to http://me.net, reason: -> -l I have NOT changed the server key and there is no file on the client called "known_hosts" Someone please tell me where the java ssh client keeps it's known host_file or speculate on what might be wrong. \_ You are the weakest link... goodbye. \_ Just a crazy guess here: did you add a file named "known_hosts" to your system lately? \_ there is NO file on the client called "known_hosts". There are no new known_hosts files on the server. Both clients that fail are running win2k recently updated to SP2. A new install of netscape on the same machine works AND the same iexplorer that fails to <DEAD>my.net<DEAD> WORKS on SODA! It is the same damn code! Unless the java ssh client has a "known_ hosts" file that it is called something else on the client, and which has a corrupted entry for <DEAD>my.net<DEAD>, and which is different for iexplorer and netscape, i can't think of where to look. \_ Its a windows box, have you tried looking in the registry yet? \_ Get a real operating system. |
2001/8/19 [Uncategorized] UID:22169 Activity:nil |
8/18 Looking for contractor(s) to design and setup e-commerce site for martial arts studio. Email me for more information. --sony |
2001/8/19 [Uncategorized] UID:22170 Activity:high |
8/18 christopher reed will die within the year. \_ reeve, you idiot \_ Who is that and why should we care? \_ Do you mean "Reeve", as in Superman? \_ but where are the h07 42N ch1x? \_ that's H0T 42N CH1X0R to you \_ pixP |
2001/8/19 [Reference/Military] UID:22171 Activity:nil |
8/19 The truth about the Second Amendment http://www.FreeRepublic.com/forum/a3b7f78c351b6.htm |
2001/8/19 [Science/Electric, Reference/Military] UID:22172 Activity:nil |
8/20 Electromagnetic tank armor http://www.freerepublic.com/forum/a3b7f55073fe9.htm |
2001/8/19 [Computer/Theory, Uncategorized/Spanish] UID:22173 Activity:nil |
8/20 I'm having a hard time figuring out some of the math behind diffe-hellman. The "key", pardon the pun, to the security of dh seems to be is that calculating g**(x*y) mod n is hard for an attacker. Say x and y are small, less than 1024, couldn't an attacker just precompute all possible K (and K') based on n and g and then do a table lookup based on the X and Y values that are exchanged to get K (or K')? It seems to me that you need to make x and y quite large to have any sort of confidence that K and K' are secure. BUT, a large x and y means the compute time per key exchange is exteremely long. What are commonly used upper bounds on x and y? Sorry, if my questions are exteremely simple, I don't have a good handle on this material yet. |
2001/8/19 [Computer/SW/Unix, Academia/Berkeley/CSUA/Troll] UID:22174 Activity:nil |
8/19 [ Censoring trolls are the worst. -- stupid troll deletion daemon ] |
2001/8/19 [Computer/SW/Security, Computer/SW/Virus] UID:22175 Activity:high |
8/19 Hi Dr Nick! - http://www.computersecuritynow.com/article.php?sid=36&mode=thread&order=0 \_ I got tape worm... |
2001/8/19-20 [Computer/SW/Security, Computer/SW/OS] UID:22176 Activity:high |
8/19 Is this normal behavior: soda:~>dmesg | more <DEAD>kofthewest.com<DEAD>, AF_INET) failed pid 33773 (a.out), uid 1216: exited on signal 11 (core dumped) \_ as of: Sun Aug 19 20:42:43 PDT 2001 it is now saying: soda:~>dmesg | more : getaddrinfo(209-76-220-17.bankofthewest.com, AF_INET) failed pid 33773 (a.out), uid 1216: exited on signal 11 (core dumped) pid 24745 (trn), uid 30148: exited on signal 6 any ideas? \_ seems like the kernel message buffer got set really low. \_ I think some hackers from bankofthewest have gotten into your kernel. REBOOT IMMEDIATELY! \_ pid 9236 (sshd), uid 0: exited on signal 11 (core dumped) WTF is sshd dumping core? |