On Wed, Nov 22, 2000 at 08:22:47AM -0600, Dave Dykstra wrote:
> That's my approach. I don't let anybody else onto my secured Unix
> workstation, and the only users I allow onto my secured server are people I
> can trust to login only from similarly secured workstations.
Oh, there is one more thing I do: if I am compelled to log in to my secured
server from a machine I don't quite trust but I think has probably not been
compromised yet, I make use of a handheld challenge/response box to
authenticate to the server (SecureID or any one-time password system would
also do) under the assumption that it is more likely that somebody will
snoop than actively hijack an ssh session. In that way nobody should be
able to come back later and log in to the server with a password I have
inadvertently given away. Nevertheless, I am taking a risk because
somebody could have set up the client to invisibly insert a command into
the ssh session that would open up another way into the server.
- Dave Dykstra