Re: Accounts on debian.org machines

2003-12-08 Thread David B Harris
On Mon, 08 Dec 2003 03:18:53 + Matthew Garrett [EMAIL PROTECTED] wrote: Steve Langasek wrote: But an ssh key on removable media is not vulnerable to keysniffing alone, where a password is. If such behaviour becomes common, the keysniffers will simply copy anything that looks like an SSH

Re: Accounts on debian.org machines

2003-12-08 Thread Scott James Remnant
On Mon, 2003-12-08 at 03:18, Matthew Garrett wrote: Steve Langasek wrote: But an ssh key on removable media is not vulnerable to keysniffing alone, where a password is. If such behaviour becomes common, the keysniffers will simply copy anything that looks like an SSH key that exists on

Re: Accounts on debian.org machines

2003-12-08 Thread Joe Drew
On Mon, 2003-12-08 at 15:37, David B Harris wrote: I've also yet to see anybody post their IP address, userid, and password for their publicly-accessible servers to a public mailing list :) I have. root, even. http://lists.debian.org/debian-devel/2002/debian-devel-200206/msg01187.html --

Re: Accounts on debian.org machines

2003-12-08 Thread David B Harris
On Mon, 08 Dec 2003 18:38:25 -0500 Joe Drew [EMAIL PROTECTED] wrote: On Mon, 2003-12-08 at 15:37, David B Harris wrote: I've also yet to see anybody post their IP address, userid, and password for their publicly-accessible servers to a public mailing list :) I have. root, even.

Re: Accounts on debian.org machines

2003-12-08 Thread Niall Young
On Mon, 8 Dec 2003, Matthew Garrett wrote: Steve Langasek wrote: But an ssh key on removable media is not vulnerable to keysniffing alone, where a password is. There's no inherent increase in security from using a key on a USB device other than the fact that attackers aren't thinking about

Re: Accounts on debian.org machines

2003-12-08 Thread Russell Coker
On Tue, 9 Dec 2003 11:04, David B Harris [EMAIL PROTECTED] wrote: Or are you saying that you used [EMAIL PROTECTED] for your computing needs, including storing your unencrypted GPG, unencrypted SSH key (or encrypted, in which case both of which use the passwords you've posted), your email

Re: Accounts on debian.org machines

2003-12-07 Thread Bernd Eckenfels
On Sun, Dec 07, 2003 at 09:27:53PM +0100, Tollef Fog Heen wrote: father's windows 2000 laptop when it's only connected to a NAT-ed internet connection. How do you know it is not trojaned when u use it? Greetings Bernd -- (OO) -- [EMAIL PROTECTED] -- ( .. ) [EMAIL

Re: Accounts on debian.org machines

2003-12-07 Thread Tollef Fog Heen
* Matt Zimmerman | (Please follow up on a public list) done, -devel has M-F-T set to. | On Sun, Dec 07, 2003 at 06:26:48PM +0100, Tollef Fog Heen wrote: | | * Matt Zimmerman | | | You would type a Debian password into a system that you do not trust | | with an ssh private key? | |

Re: Accounts on debian.org machines

2003-12-07 Thread Tollef Fog Heen
* Bernd Eckenfels | On Sun, Dec 07, 2003 at 09:27:53PM +0100, Tollef Fog Heen wrote: | father's windows 2000 laptop when it's only connected to a NAT-ed | internet connection. | | How do you know it is not trojaned when u use it? I don't. Just like I don't know that my Debian laptop isn't

Re: Accounts on debian.org machines

2003-12-07 Thread Steve Langasek
On Sun, Dec 07, 2003 at 09:27:53PM +0100, Tollef Fog Heen wrote: * Matt Zimmerman | (Please follow up on a public list) done, -devel has M-F-T set to. | On Sun, Dec 07, 2003 at 06:26:48PM +0100, Tollef Fog Heen wrote: | | * Matt Zimmerman | | | You would type a Debian password

Re: Accounts on debian.org machines

2003-12-07 Thread Matthew Garrett
Steve Langasek wrote: But an ssh key on removable media is not vulnerable to keysniffing alone, where a password is. If such behaviour becomes common, the keysniffers will simply copy anything that looks like an SSH key that exists on an item of removable media. There's no inherent increase in