On Sep 27, 2005, at 11:37 PM, Jurjen Oskam wrote:

On Tue, Sep 27, 2005 at 11:36:22PM -0500, C. Bensend wrote:

1)  Log into system via ssh skey, which is a one-time auth method
2)  Type 'sudo farfegnugen blahblah yadda'
3)  Log out

You're assuming that the keys you press are transmitted unmodified to
your server. Since the terminal is not under your control, there's
no reason why it can't send, e.g., "sudo rm -rf /" all by itself after
it sees you're logged in.

And this is just one example.

--
Jurjen Oskam


To take this a step further, the host os (untrusted Windows box) could also inject malicious keystrokes into an SSH session. It wouldn't be as easy an attack since the injection has to happen between the keyboard and Putty (rather than just injecting into an unencrypted stream), but it still presents an attack vector.

You can put a live-cd together on a business card sized CD that will fit in your wallet. Even if you end up with Knoppix instead of OpenBSD, at least you know it's clean.

Reply via email to