Bug#756172: ITP: ssh-cron -- cron-like job scheduler than handles ssh key passphrases

2014-07-27 Thread peter green


 ssh-cron acts like cron, but is provided with ssh passphrases allowing
 its commands to access remote systems without requiring a passphrase
 to be stored in a clear-text file or resorting to ssh keys without
 passphrases.
  
How is it provided with them? is the user required to enter them on 
startup? are they stored somewhere? if the latter how is it more secure 
than using a key without a passphrase?



--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org



Bug#756172: ITP: ssh-cron -- cron-like job scheduler than handles ssh key passphrases

2014-07-27 Thread tony mancill
On 07/27/2014 06:45 AM, peter green wrote:

  ssh-cron acts like cron, but is provided with ssh passphrases allowing
  its commands to access remote systems without requiring a passphrase
  to be stored in a clear-text file or resorting to ssh keys without
  passphrases.
   
 How is it provided with them? is the user required to enter them on
 startup? are they stored somewhere? if the latter how is it more secure
 than using a key without a passphrase?

Hi Peter,

The passphrases are managed via ssh-agent, which will employ ssh-askpass
to collect the necessary passphrase(s) at startup.  You can get an
overview of the sequence via the manpage:

   http://sshcron.sourceforge.net/ssh-cron.1.html

Cheers,
tony





signature.asc
Description: OpenPGP digital signature


Bug#756172: ITP: ssh-cron -- cron-like job scheduler than handles ssh key passphrases

2014-07-27 Thread tony mancill
/me mutters something about being incompatible with reportbug...

The upstream author and URL should have been in the original report
(corrected below).

On 07/27/2014 01:54 AM, Marc Haber wrote:
 On Sat, 26 Jul 2014 21:05:37 -0700, tony mancill tmanc...@debian.org
 wrote:
 * Package name   : ssh-cron
  Version : 0.91.01
  Upstream Author : Frank B. Brokken f.b.brok...@rug.nl
 * URL: http://sshcron.sourceforge.net/
 * License: GPL-2+
  Programming Lang: C++
  Description : cron-like job scheduler than handles ssh key passphrases

 ssh-cron acts like cron, but is provided with ssh passphrases allowing
 its commands to access remote systems without requiring a passphrase
 to be stored in a clear-text file or resorting to ssh keys without
 passphrases.
 
 Why would one use such a tool? passphraseless keys exist, and can be
 configured to be secure.

Hello Marc,

Thank you, Ansgar and Paul for responses regarding other ways to perform
these tasks. Specifically:

 It is possible to restrict keys in .ssh/authorized_keys so that they are
 only allowed to run specific commands, see the 'command=command' bit in
 man:sshd(8). One probably wants to combine this with no-port-forwarding
 and similar options.

and in more detail:

 http://blog.ganneff.de/blog/2007/12/29/ssh-triggers.html

The idea for ssh-cron is to be able to use the keys (one might currently
already have) without having to generate separate keys for triggers, and
while maintaining a passphrase.  Whether or not that's advisable given
alternatives such as ssh triggers depends on your risk tolerance and the
specifics of your environment.

It seems like with Ganneff's trigger mechanism, one attack vector is to
steal a backup of the passphraseless key and spoof the source IP - now
you can run the trigger at will.  Having a passphrase on the key could
at least slow the attacker down.  I could imagine using ssh-cron
together with command= for a higher level of security.

In any event, thank you for the discussion.  I'll confer with the
upstream author before proceeding with the package.

Regards,
tony




signature.asc
Description: OpenPGP digital signature


Bug#756172: ITP: ssh-cron -- cron-like job scheduler than handles ssh key passphrases

2014-07-27 Thread Philipp Kern
On Sun, Jul 27, 2014 at 08:40:03AM -0700, tony mancill wrote:
 It seems like with Ganneff's trigger mechanism, one attack vector is to
 steal a backup of the passphraseless key and spoof the source IP - now
 you can run the trigger at will.  Having a passphrase on the key could
 at least slow the attacker down.  I could imagine using ssh-cron
 together with command= for a higher level of security.

Uhm, spoof the source IP? This is not UDP, you'd also need to get traffic back
redirected to you.

Kind regards
Philipp Kern


signature.asc
Description: Digital signature


Bug#756172: ITP: ssh-cron -- cron-like job scheduler than handles ssh key passphrases

2014-07-26 Thread tony mancill
Package: wnpp
Severity: wishlist
Owner: tony mancill tmanc...@debian.org

* Package name: ssh-cron
  Version : 0.91.01
  Upstream Author : 
* URL : 
* License : GPL-2+
  Programming Lang: C++
  Description : cron-like job scheduler than handles ssh key passphrases

 ssh-cron acts like cron, but is provided with ssh passphrases allowing
 its commands to access remote systems without requiring a passphrase
 to be stored in a clear-text file or resorting to ssh keys without
 passphrases.


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org