[Info-vax] Is Eisner down?

VAXman- at SendSpamHere.ORG VAXman- at SendSpamHere.ORG
Wed Dec 4 19:31:05 EST 2013


In article <l7oaq8$33v$1 at news.albasani.net>, Jan-Erik Soderholm <jan-erik.soderholm at telia.com> writes:
>VAXman- @SendSpamHere.ORG wrote 2013-12-04 23:09:
>> In article <l7o6ki$h0e$1 at solani.org>, Michael Kraemer <M.Kraemer at gsi.de> writes:
>>> Bill Gunshannon schrieb:
>>>
>>>> I have to say it again.  Why on earth would anyone run telnet on any
>>>> server?  What can it possibly offer that is worth the risk?
>>>
>>> Less hassle than the mess which comes with ssh/ssl?
>>> And if the network is "internal", what risk?
>>
>> Internal networks have as many if not more reason to use it.  It's so easy
>> today to load Linux on a box and fire up Wireshark.  It won't take too long
>> before somebody is sniffing the passwords to administrative accounts!
>>
>
>On an older networks using hubs maybe. On a modern network using
>switches, your Wireshark will only see your own network traffic.
>You need some network admin to do some "mangement" in a switch
>to copy others traffic to your port.

You assume that the MCSEs now put in charge of the Corp. network even have a
clue.  I spent the past summer, on and off, at a site with issues revolving
about remote shadow copies.  Basically, they way the smart-switches had been
configured caused EVERYTHING to appear on the link between the local and the
remote site -- a link that should have been only cluster/shadow traffic.  I
doubt very much that those remote VMS boxes could give a shit about Dropbox, 
Pandora and Facebook but that crap was appearing on the link to the remote!

-- 
VAXman- A Bored Certified VMS Kernel Mode Hacker    VAXman(at)TMESIS(dot)ORG

Well I speak to machines with the voice of humanity.



More information about the Info-vax mailing list