On Wed, Apr 04, 2001 at 04:58:41PM -0400, Christopher Faylor wrote:
> On Wed, Apr 04, 2001 at 01:04:02PM -0700, Karl M wrote:
> >Hi Corinna and All...
> >
> >Consider the following...Suppose sshd were modified so that password 
> >authentication could succeed only if RSA authentication had almost succeeded 
> >(meaning that the RSA authentication itself succeeded but the setuid 
> >failed). Then the authentication sequence might look something like this:
> >
> >Client and server try RSA authentication.
> >
> >Server detects that RSA authentication succeeded but the setuid failed and 
> >sets a flag to remember this fact.
> >
> >Server tells client that RSA authentication failed.
> >
> >Client and server try password authentication.
> >
> >Server checks the flag and only allows success if the flag is set. This 
> >might be controlled by setting passwordAuthentication to "maybe" instead of 
> >the usual "yes" or "no" in sshd_config.
> >
> >The result is that I have typed both a passphrase and a password correctly 
> >in order to get in. This means that for any attacks by a listener on the 
> >internet, I have the security of RSA authentication--which I believe is 
> >better than most passwords. I also have the password needed to make life 
> >good (and easy) in the NT world.
> >
> >Do you see any security holes?
> >
> >Would this be of general interest?
> 
> Sounds like a question for the openssh mailing list.  I doubt that anyone
> here besides Corinna can really answer this.

A few days ago somebody posted a patch into the openssh-unix-dev
mailing list which allows forcing multiple authentication methods.
RSA + Password authentication is just one way then. I don't know
if it will be applied, though.

Corinna

-- 
Corinna Vinschen                  Please, send mails regarding Cygwin to
Cygwin Developer                                mailto:[EMAIL PROTECTED]
Red Hat, Inc.

--
Want to unsubscribe from this list?
Check out: http://cygwin.com/ml/#unsubscribe-simple

Reply via email to