On Mon, Jul 10, 2000 at 09:35:37AM -0400, Noel L Yap wrote:
>    If the superuser on the
>    remote host cannot be trusted, or the root account has been
>    compromised, the xauth key can be read from the user's .Xauthority file,
>    and used to connect to the client machine.

If the remote machine has been rooted who is to say that sshd hasn't
been replaced by a trojan that collects your login credentials and
emails them to the cracker? This is not any 'vulnerability', just a
misunderstanding of what ssh can and can't do. It cannot detect whether
a remote machine has been rooted. If you don't trust the remote machine,
don't connect.

> IMHO, UseLogin should never be turned on anyway).

Yes, I would agree in most circumstances. But there are cases where a
system's login(1) does additional or supplemtary authentification or
some other customised operations.

> Where can I find documentation on more vulnerabilities?

http://www.securityfocus.com/ is a good place to start.

Regards,

james
-- 
James Raftery (JBR54)  -  Programmer Hostmaster  -  IE TLD Hostmaster
   IE Domain Registry  -  www.domainregistry.ie  -  (+353 1) 706 2375
  "Managing 4000 customer domains with BIND has been a lot like
   herding cats." - Mike Batchelor, on [EMAIL PROTECTED]

Reply via email to