Les Mikesell <lesmikesell at gmail.com> wrote: > Except for the versions of ssh that allowed exploits... _All_ versions of SSH allow for exploits in a variety of ways. Ironically, the best way to kill them has worked for years now, through numerous exploits! But sysadmins won't adopt it. And that's to require public key authentication. -- Bryan J. Smith | Sent from Yahoo Mail mailto:b.j.smith at ieee.org | (please excuse any http://thebs413.blogspot.com/ | missing headers)