On Thu, 8 Nov 2001, Rodolfo J. Paiz wrote:

> At 11/8/2001 05:13 AM -0800, you wrote:
> >While I agree that useing SSH over an open network is the way to go, on a 
> >closed network,
> >telnet is just fine.
> 
> By some sources, over 80% of attacks, thefts, sabotages, etc. are internal.
> 
> By my own consulting practices, a *huge* percentage of problems are 
> internally-caused.
> 
> In kidnapping cases, 95% of attackers had inside information.
> 
> In divorce cases where money is an issue, in over 85% of cases one spouse 
> is spying or stealing information from the other.
> 
> Yes, you can do it. But really, if SSH works just as well out-of-the-box 
> and is just as simple, why would you?
> 
> Heck, on my internal network SSH is much *easier*. I set up the right keys, 
> and now I type one password when logging in then get access to everything, 
> properly authenticated, transparently.
> 
> Just because a thing *can* be done is often no reason to do it.

Well spoken, Rodolfo.  My standard is to only permit telnet to devices
that cannot do ssh, yet.  And where I work, this is policy and practice.





_______________________________________________
Redhat-list mailing list
[EMAIL PROTECTED]
https://listman.redhat.com/mailman/listinfo/redhat-list

Reply via email to