You are not logged in.
Pages: 1
So from what I know, the AIM protocol sends login information unencrypted, with the password MD5'd. So if one were to login on wifi and someone were sniffing the packets, this would enable someone else to logon with that account. As far as I know that's all they should be able to do with it though, e.g. can't change the password or anything.
Does anyone know if it's possible to logon with AIM securely?
Offline
Hello nonexistent!
http://www.techimo.com/forum/networking … login.html
http://www.aimencrypt.com/
Hope this helps to get some related information.
Offline
Well, I'm no expert, but if you're primarily worried about wifi sniffing, then it seems that a possible solution could be --
1. Set up irssiproxy and bitlbee (this allows the AIM connection)
2. Connect to the server in #1 using an ssh tunnel.
3. Set your local IRC client (yes, IRC -- not just an AIM client -- the AIM connection occurs with bitlbee on the remote server) to look at the local ssh connection.
That should give you the peace of mind for any wifi sniffers around. Hope that makes sense! Check the wiki for setting up irssi, irssiproxy and bitlbee. It's reasonable easy to setup, but after it's working, the only extra step to log on each day will be to make sure the ssh tunnel is active.
Good luck!
Scott
Last edited by firecat53 (2009-08-09 15:55:18)
Offline
Pages: 1