Date: Wed, 11 Feb 2009 12:47:28 +0100 From: =?utf-8?Q?Dag-Erling_Sm=C3=B8rgrav?= <des@des.no> To: Jason Stone <freebsd-security@dfmm.org> Cc: freebsd-security@freebsd.org, Lyndon Nerenberg <lyndon@orthanc.ca>, Daniel Roethlisberger <daniel@roe.ch> Subject: Re: OPIE considered insecure Message-ID: <86eiy5nqjz.fsf@ds4.des.no> In-Reply-To: <20090209134738.G15166@treehorn.dfmm.org> (Jason Stone's message of "Mon, 9 Feb 2009 13:53:47 -0800 (PST)") References: <200902090957.27318.mail@maxlor.com> <20090209170550.GA60223@hobbes.ustdmz.roe.ch> <alpine.BSF.2.00.0902091246280.61088@mm.orthanc.ca> <20090209134738.G15166@treehorn.dfmm.org>
next in thread | previous in thread | raw e-mail | index | archive | help
Jason Stone <freebsd-security@dfmm.org> writes: > Right, but that's not the problem they're trying to solve. They're > trying to solve the problem of logging in _from_ an untrusted machine, > to a trusted machine. If the machine you're logging in *from* is untrusted, you're SOL. Even with OPIE or similar mechanisms, somebody might piggyback on your SSH connection. The best you can do is boot from a CD or USB fob you prepared yourself, and even then, there might be a hardware key logger installed on the computer. DES --=20 Dag-Erling Sm=C3=B8rgrav - des@des.no
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?86eiy5nqjz.fsf>