Les Mikesell lesmikesell@gmail.com wrote:
Except for the versions of ssh that allowed exploits...
_All_ versions of SSH allow for exploits in a variety of ways.
Ironically, the best way to kill them has worked for years now, through numerous exploits! But sysadmins won't adopt it.
And that's to require public key authentication.