On Wed, 22 May 2002 14:40:15 -0700
"Vineet Kumar" <[EMAIL PROTECTED]> wrote:

> * Michael D. Schleif ([EMAIL PROTECTED]) [020521 12:10]:
> > Here's my lack of understanding:
> > 
> > [a] ssh [EMAIL PROTECTED] requires cracking only one (1) string:
> >     [1] root's password
> > 
> > [b] ssh [EMAIL PROTECTED] requires cracking three (3) separate
> > strings:
> >     [1] mortal_user's username (without this, there is not even system
> > access);
> >     [2] mortal_user's password; and
> >     [3] root's password
> > 
> > Since _god_ on a given system is almost always root or administrator,
> > I fail to see how [a] can be considered at least as secure as [b].
> > 
> > What am I missing?
> 
> The point is that once you have [b1] and [b2], [b3] is as easy to get
> by dropping in a new '~/bin/su' which will read a password, pretend to
> the user that there was a typo, read it again, email you the password,
> delete itself, and then perform the real /bin/su.

Correct.  Assuming that the cracker has [b1] & [b2] & the system is
allowed to send the message out.  However the cracker must gain the above
before becoming root.  They can't simply step right in via root allowed
logins and password authentication.

> So this boils down to [b] is better because of [b1], which I think we'll
> all agree isn't *that* difficult to get, if you know anyone who has an
> account on the machine, or even just patience and a watchful eye.
> Generally usernames aren't kept super-super secret.

Which in and of itself is a good argument for using keyed access rather
than password based authentication for SSH (or other remote shells).

-- 
Jamin W. Collins


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to