On Mon, Jul 10, 2000 at 09:35:37AM -0400, Noel L Yap wrote:
> If the superuser on the
> remote host cannot be trusted, or the root account has been
> compromised, the xauth key can be read from the user's .Xauthority file,
> and used to connect to the client machine.
If the remote machine has been rooted who is to say that sshd hasn't
been replaced by a trojan that collects your login credentials and
emails them to the cracker? This is not any 'vulnerability', just a
misunderstanding of what ssh can and can't do. It cannot detect whether
a remote machine has been rooted. If you don't trust the remote machine,
don't connect.
> IMHO, UseLogin should never be turned on anyway).
Yes, I would agree in most circumstances. But there are cases where a
system's login(1) does additional or supplemtary authentification or
some other customised operations.
> Where can I find documentation on more vulnerabilities?
http://www.securityfocus.com/ is a good place to start.
Regards,
james
--
James Raftery (JBR54) - Programmer Hostmaster - IE TLD Hostmaster
IE Domain Registry - www.domainregistry.ie - (+353 1) 706 2375
"Managing 4000 customer domains with BIND has been a lot like
herding cats." - Mike Batchelor, on [EMAIL PROTECTED]