>>>>> "Greg" == Greg A Woods <[EMAIL PROTECTED]> writes:

Greg> [ On Thursday, February 11, 1999 at 11:39:47 (+0100), Peter Svensson wrote: ]
>> 
>> An example of such a system is one which requires authentication of _all_
>> your actions through a trusted device. This in effect moves the terminal
>> client to the trusted device.

Greg> No, it does not.

Greg> You say you are talking about keys and authentication schemes, but then
Greg> you say that you don't trust the computing device on which the SSH
Greg> client software runs.  These are two entirely different and separate
Greg> things.

OK folks, this has become completely non-productive. You're yelling past
each other, with no benefit.

Lets take an example, just for fun:

A friend's machine Evil has been hacked. It's logging all keystrokes,
unbeknownst to said friend.

I log in to Evil, and use SSH to log in to my home machine

I do some stuff, and log off.

31331 hacker Fred logs into Evil, and grabs the keystroke logs

Now, if I logged in with an RSA key, or a re-useable password, I'm fucked.

If, on the other hand, I logged in with a One Time Password, I'm safe, for
some values of safe (did I type any passwords on my network while I was
logged in?)

Take another scenario - this time Fred has also replaced ssh on Evil with a
version that installs trojans on any machine ssh connects successfully to,
and hides it's actions by swallowing terminal output from its commands.

I am now still fucked if I used any re-useable auth.

I am now also fucked if I used OTPs, and Fred was clever enough in his
trojans to create a hole in my home machine.

So, an untrusted client is unsafe. An untrusted client using OTPs is _less_
unsafe that one using some re-useable auth system.

Can we all agree on this?

-- 
Carson Gaspar -- [EMAIL PROTECTED] [EMAIL PROTECTED] [EMAIL PROTECTED]
http://www.cs.columbia.edu/~carson/home.html
Queen Trapped in a Butch Body

Reply via email to