[39854] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: 'we should all be uncomfortable with the extent to which luck ..'

daemon@ATHENA.MIT.EDU (David Shaw)
Wed Jul 25 15:07:33 2001

Date: Wed, 25 Jul 2001 15:06:17 -0400
From: David Shaw <dshaw@jabberwocky.com>
To: John Fraizer <nanog@Overkill.EnterZone.Net>
Cc: Roeland Meyer <rmeyer@mhsc.com>, "'k claffy'" <kc@ipn.caida.org>,
	nanog@nanog.org, caida@caida.org
Message-ID: <20010725150617.B1975@akamai.com>
Mail-Followup-To: John Fraizer <nanog@Overkill.EnterZone.Net>,
	Roeland Meyer <rmeyer@mhsc.com>, 'k claffy' <kc@ipn.caida.org>,
	nanog@nanog.org, caida@caida.org
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <Pine.LNX.4.21.0107251454020.28199-100000@Overkill.EnterZone.Net>; from nanog@Overkill.EnterZone.Net on Wed, Jul 25, 2001 at 02:58:08PM -0400
Errors-To: owner-nanog-outgoing@merit.edu


On Wed, Jul 25, 2001 at 02:58:08PM -0400, John Fraizer wrote:
> On Wed, 25 Jul 2001, David Shaw wrote:

> > On Tue, Jul 24, 2001 at 11:42:21PM -0700, Roeland Meyer wrote:
> > > How many of us here run anything less than SSH and even allow telnetd to
> > > live on any of our hosts?
> > 
> > telnetd is not inherently bad.  It is a tool that is lacking the
> > session encryption and strong authentication features of SSH, but is
> > still useful in some cases.  Like any tool it can be used poorly, but
> > that is not the fault of the tool.
> > 
> > For example, when traveling, I can log in securely from any random
> > Internet cafe using OPIE or S/Key one-time passwords via telnet.  SSH
> > requires that you trust your local machine, and OPIE assumes that you
> > don't.

> You may not expose your password to get into your network but, you do
> expose everything else that happens on the connection, including the
> passwords to devices that do not use/support OPIE or S/Key
> authentication.

Absolutely.  OPIE is a strongly authenticated login tool.  It does not
encrypt the session.  I am aware of this, and thus don't type anything
I don't want sniffed.

> You can run an SSH client in a java applet in nearly any browser.
> If some devices on your network don't support ssh, ssh into
> something that does and from there, telnet to the devices that
> don't.

This is the part I disagree with.  Given my example (needing to
connect from a public machine while traveling), I cannot trust the
local terminal.

The SSH protocol requires a secure local terminal so using the Java
SSH client does not protect me in the slightest if I can't trust that
terminal, and a public terminal, by its very nature, can never be
trusted.

David

-- 
   David Shaw  |  dshaw@jabberwocky.com  |  WWW http://www.jabberwocky.com/
+---------------------------------------------------------------------------+
   "There are two major products that come out of Berkeley: LSD and UNIX.
      We don't believe this to be a coincidence." - Jeremy S. Anderson

home help back first fref pref prev next nref lref last post