[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
hijacked SSH sessions
- To: or-talk@xxxxxxxx
 
- Subject: hijacked SSH sessions
 
- From: Taka Khumbartha <scarreigns@xxxxxxxxx>
 
- Date: Sun, 15 Oct 2006 22:09:37 -0700
 
- Delivered-to: archiver@seul.org
 
- Delivered-to: or-talk-outgoing@seul.org
 
- Delivered-to: or-talk@seul.org
 
- Delivery-date: Mon, 16 Oct 2006 01:08:44 -0400
 
- Domainkey-signature: a=rsa-sha1; q=dns; c=nofws;        s=beta; d=gmail.com;        h=received:message-id:date:from:organization:mime-version:to:subject:content-type:content-transfer-encoding;        b=CwcKPKAZ+YRs6Pc61Atvv2IUkkfuOnQaJOBnhC1FsbBMBmT0Iv/U3VntbUo9tXPA+pl8lfU4RATuEUKJid54ltXgTcN8LrA3Y2EBDYNucnyReW5pc7PJA4X2CNeDZiLtkrPlE+kkZDFRxcMHFs+/qvgW4bQNse/Qfcmjn+b+Wj4=
 
- Organization: Scar Reigns, Inc.
 
- Reply-to: or-talk@xxxxxxxxxxxxx
 
- Sender: owner-or-talk@xxxxxxxxxxxxx
 
today i have had several attempted "man in the middle" attacks on my SSH sessions.  i am not sure which exit node(s) i was using, but the MD5 hash of the fingerprint of the spoofed host key is:
4d:64:6f:bc:bf:4a:fa:bd:ce:00:b0:8e:c9:40:60:57
and it does not matter which host i connect to, the MD5 hash presented it always the same.
just a heads up