Date: Sun, 3 Jun 2001 15:25:57 +0200 From: Patrick Atamaniuk <patrick-lists@atabersk.de> To: freebsd-security@FreeBSD.ORG Subject: Re: Apache Software Foundation Server compromised, resecured. (fwd) Message-ID: <20010603152556.B51658@mail.atabersk.de> In-Reply-To: <Pine.BSF.4.31.0106010850550.679-100000@localhost>; from brian@collab.net on Fri, Jun 01, 2001 at 08:55:16AM -0700 References: <xzpvgmgwbvv.fsf@flood.ping.uio.no> <Pine.BSF.4.31.0106010850550.679-100000@localhost>
next in thread | previous in thread | raw e-mail | index | archive | help
[-- Attachment #1 --]
Brian Behlendorf(brian@collab.net)@2001.06.01 08:55:16 +0000:
> On 1 Jun 2001, Dag-Erling Smorgrav wrote:
> > You don't need passwords to run CVS against a remote repository. All
> > you need is 'CVSROOT=user@server:/path/to/repo' and 'CVS_RSH=ssh'.
>
> For those who use windows and mac GUI CVS clients, pserver's a
> requirement.
>
> IMHO, passwords are neither better nor worse, necessarily, than keys, in
> authenticating to a server. The basic difference is between "what you
> know" and "what you have". I'm as worried about people who have poor
> password management practices, as I am about people whose home or work
> machines where their private keys are may not be the most secure.
OR having the same private key on more than one machine.
The second problem is the practice of 'hopping', which then
involves typing pass[wd|phrase] on a trojaned client. Using ssh-agent or
not, using an untrusted client for performing challenge-response operations
caused the secondary attack to 3rd servers.
Host-hopping must become a banished practice.
If hopping has to be done, the untrusted client must not perform any
authentication to the 3rd server. This probably can be achieved with standard
port forwarding.
Assume i do have a private key on my local workstation A for host B and C.
i establish a tunnel from A to B:
A> ssh -L 9999:C:22 B
and use it with
A> ssh -p 9999 localhost
host B is only involed with authorized_keys authorizing the tunnel establishment.
All authentication between C and A does not involve the client B decrypting anything.
Though B can snoop the communication as it would be on local lan, it cannot directly
intercept keystrokes for passphrase or perform AUTH_SOCK capturing.
imvho.
--
regards,
Patrick
----------------------------------------------------
Patrick Atamaniuk patrick@atabersk.de
----------------------------------------------------
[-- Attachment #2 --]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.4 (FreeBSD)
Comment: For info see http://www.gnupg.org
iD8DBQE7GjrkeMAU+YCwvPYRAjA1AKCjVhi7EX/4arFsQciBlsVcBh0C8wCeIQ57
vo5TK8jbVitfb4TXkCehuIE=
=xTSx
-----END PGP SIGNATURE-----
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20010603152556.B51658>
