Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 11 Feb 2009 12:47:28 +0100
From:      =?utf-8?Q?Dag-Erling_Sm=C3=B8rgrav?= <des@des.no>
To:        Jason Stone <freebsd-security@dfmm.org>
Cc:        freebsd-security@freebsd.org, Lyndon Nerenberg <lyndon@orthanc.ca>, Daniel Roethlisberger <daniel@roe.ch>
Subject:   Re: OPIE considered insecure
Message-ID:  <86eiy5nqjz.fsf@ds4.des.no>
In-Reply-To: <20090209134738.G15166@treehorn.dfmm.org> (Jason Stone's message of "Mon, 9 Feb 2009 13:53:47 -0800 (PST)")
References:  <200902090957.27318.mail@maxlor.com> <20090209170550.GA60223@hobbes.ustdmz.roe.ch> <alpine.BSF.2.00.0902091246280.61088@mm.orthanc.ca> <20090209134738.G15166@treehorn.dfmm.org>

next in thread | previous in thread | raw e-mail | index | archive | help
Jason Stone <freebsd-security@dfmm.org> writes:
> Right, but that's not the problem they're trying to solve.  They're
> trying to solve the problem of logging in _from_ an untrusted machine,
> to a trusted machine.

If the machine you're logging in *from* is untrusted, you're SOL.  Even
with OPIE or similar mechanisms, somebody might piggyback on your SSH
connection.  The best you can do is boot from a CD or USB fob you
prepared yourself, and even then, there might be a hardware key logger
installed on the computer.

DES
--=20
Dag-Erling Sm=C3=B8rgrav - des@des.no



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?86eiy5nqjz.fsf>