From owner-freebsd-stable Wed May 30 7:37:23 2001 Delivered-To: freebsd-stable@freebsd.org Received: from yertle.kciLink.com (yertle.kcilink.com [216.194.193.105]) by hub.freebsd.org (Postfix) with ESMTP id 4A63737B43E for ; Wed, 30 May 2001 07:37:21 -0700 (PDT) (envelope-from khera@kciLink.com) Received: from onceler.kciLink.com (onceler.kciLink.com [216.194.193.106]) by yertle.kciLink.com (Postfix) with ESMTP id AEEB22E461; Wed, 30 May 2001 10:37:13 -0400 (EDT) Received: (from khera@localhost) by onceler.kciLink.com (8.11.3/8.11.3) id f4UEbD100861; Wed, 30 May 2001 10:37:13 -0400 (EDT) (envelope-from khera) From: Vivek Khera MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit Message-ID: <15125.1433.517037.245078@onceler.kciLink.com> Date: Wed, 30 May 2001 10:37:13 -0400 To: Matt Dillon Cc: Seth , stable@FreeBSD.ORG Subject: Re: adding "noschg" to ssh and friends In-Reply-To: <200105292315.f4TNFOu31573@earth.backplane.com> References: <15124.4635.887375.682204@onceler.kciLink.com> <20010529145609.A1209@xor.obsecurity.org> <15124.7132.963202.560009@onceler.kciLink.com> <200105292211.f4TMBpB30316@earth.backplane.com> <20010529183239.B14308@psychotic.aberrant.org> <200105292315.f4TNFOu31573@earth.backplane.com> X-Mailer: VM 6.90 under 21.1 (patch 14) "Cuyahoga Valley" XEmacs Lucid Sender: owner-freebsd-stable@FreeBSD.ORG Precedence: bulk List-ID: List-Archive: (Web Archive) List-Help: (List Instructions) List-Subscribe: List-Unsubscribe: X-Loop: FreeBSD.ORG >>>>> "MD" == Matt Dillon writes: MD> Putting on my security hat... no. All you are doing is forcing the MD> hacker to use some more obscure and possibly less detectable way to MD> compromise the machine. So, in fact, you could be making the problem MD> *worse*. I guess in general, that may be correct. But wouldn't you want some reassurance that your only "secure" connection to the machine is not tamered with? That is, if your machine is compromised, and the only way you can connect to it is via a trojaned service, then you're really hosed. I think ssh should be protected from this type of attack. In any case, what about my other question? If I "schg" the ssh related executables and libs, will installworld croak or does it know to noschg all files first? I can't see that it does it even for the binaries that are schg in the system already (like rsh). To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-stable" in the body of the message