[13598] in bugtraq

home help back first fref pref prev next nref lref last post

Re: S/Key & OPIE Database Vulnerability

daemon@ATHENA.MIT.EDU (Eivind Eklund)
Fri Jan 28 15:12:23 2000

Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Message-Id:  <20000128122310.D15603@bitbox.follo.net>
Date:         Fri, 28 Jan 2000 12:23:10 +0100
Reply-To: Eivind Eklund <eivind@YES.NO>
From: Eivind Eklund <eivind@YES.NO>
X-To:         Brandon Palmer <merlin@SCL.CWRU.EDU>
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To:  <Pine.GSO.4.10.10001270935060.2313-100000@tigris>; from
              merlin@SCL.CWRU.EDU on Thu, Jan 27, 2000 at 09:40:35AM -0500

On Thu, Jan 27, 2000 at 09:40:35AM -0500, Brandon Palmer wrote:
> > Ultimately I wonder how much of a future S/Key has now that SSH and
> > similar utilities are widely deployed and provide much more
> > sophisticated protections, especially session encryption.
>
> I think there is definatly still a need.  There are many cases in which I
> am not on a machine what has ssh (ie some public telnet shell).  Though
> the session is not encrypted,  my password is still safe.  Until ssh-java
> shells are common,  s/key still has it's place.

This indicates a rather common misconception.  SSH-Java shells should
NOT make a public terminal trusted for your password; the TERMINAL is
insecure, and is rather likely to be running a keystroke logger.  SSH
only makes the connection from the box it runs on to the box in the
other end secure.

Eivind.

home help back first fref pref prev next nref lref last post