| ||||||
| 2001/8/19-22 [Computer/SW/Languages/Java, Computer/SW/Mail] UID:22168 Activity:high |
8/18 I stole the jar for the MindTerm Java SSH client off Soda a
long time ago and it has always worked fine. Now, out of the
blue i'm getting the mesg.:
"Found prieinstalled 'known_hosts' file.
Error connecting to http://me.net, reason:
-> -l
I have NOT changed the server key and there is no file on the
client called "known_hosts" Someone please tell me where the
java ssh client keeps it's known host_file or speculate on
what might be wrong.
\_ You are the weakest link... goodbye.
\_ Just a crazy guess here: did you add a file named "known_hosts"
to your system lately?
\_ there is NO file on the client called "known_hosts". There are
no new known_hosts files on the server.
Both clients that fail are running win2k recently updated to
SP2. A new install of netscape on the same machine works AND
the same iexplorer that fails to <DEAD>my.net<DEAD> WORKS on SODA! It is
the same damn code! Unless the java ssh client has a "known_
hosts" file that it is called something else on the client, and
which has a corrupted entry for <DEAD>my.net<DEAD>, and which is different
for iexplorer and netscape, i can't think of where to look.
\_ Its a windows box, have you tried looking in the registry
yet?
\_ Get a real operating system. |
| 2001/8/19 [Uncategorized] UID:22169 Activity:nil |
8/18 Looking for contractor(s) to design and setup
e-commerce site for martial arts studio.
Email me for more information. --sony |
| 2001/8/19 [Uncategorized] UID:22170 Activity:high |
8/18 christopher reed will die within the year.
\_ reeve, you idiot
\_ Who is that and why should we care?
\_ Do you mean "Reeve", as in Superman?
\_ but where are the h07 42N ch1x?
\_ that's H0T 42N CH1X0R to you
\_ pixP |
| 2001/8/19 [Reference/Military] UID:22171 Activity:nil |
8/19 The truth about the Second Amendment
http://www.FreeRepublic.com/forum/a3b7f78c351b6.htm |
| 2001/8/19 [Science/Electric, Reference/Military] UID:22172 Activity:nil |
8/20 Electromagnetic tank armor
http://www.freerepublic.com/forum/a3b7f55073fe9.htm |
| 2001/8/19 [Computer/Theory, Uncategorized/Spanish] UID:22173 Activity:nil |
8/20 I'm having a hard time figuring out some of the math behind
diffe-hellman. The "key", pardon the pun, to the security of
dh seems to be is that calculating g**(x*y) mod n is hard
for an attacker. Say x and y are small, less than 1024,
couldn't an attacker just precompute all possible K (and K')
based on n and g and then do a table lookup based on the X
and Y values that are exchanged to get K (or K')?
It seems to me that you need to make x and y quite large to
have any sort of confidence that K and K' are secure. BUT,
a large x and y means the compute time per key exchange is
exteremely long. What are commonly used upper bounds on x
and y?
Sorry, if my questions are exteremely simple, I don't have
a good handle on this material yet. |
| 2001/8/19 [Computer/SW/Unix, Academia/Berkeley/CSUA/Troll] UID:22174 Activity:nil |
8/19 [ Censoring trolls are the worst. -- stupid troll deletion daemon ] |
| 2001/8/19 [Computer/SW/Security, Computer/SW/Virus] UID:22175 Activity:high |
8/19 Hi Dr Nick! - http://www.computersecuritynow.com/article.php?sid=36&mode=thread&order=0 \_ I got tape worm... |
| 2001/8/19-20 [Computer/SW/Security, Computer/SW/OS] UID:22176 Activity:high |
8/19 Is this normal behavior:
soda:~>dmesg | more
<DEAD>kofthewest.com<DEAD>, AF_INET) failed
pid 33773 (a.out), uid 1216: exited on signal 11 (core dumped)
\_ as of: Sun Aug 19 20:42:43 PDT 2001
it is now saying:
soda:~>dmesg | more
: getaddrinfo(209-76-220-17.bankofthewest.com, AF_INET) failed
pid 33773 (a.out), uid 1216: exited on signal 11 (core dumped)
pid 24745 (trn), uid 30148: exited on signal 6
any ideas?
\_ seems like the kernel message buffer got set really low.
\_ I think some hackers from bankofthewest have gotten into
your kernel. REBOOT IMMEDIATELY!
\_ pid 9236 (sshd), uid 0: exited on signal 11 (core dumped)
WTF is sshd dumping core? |