[svlug] Configuring Server - SSH Trouble + Security Considerations
Don Marti
dmarti at zgp.org
Thu Oct 26 11:19:05 PDT 2006
begin Rick Moen quotation of Wed, Oct 25, 2006 at 09:00:39AM -0700:
> $BADUSER has shell on an indifferently administered university machine,
> hunts around for local vulnerabilities, and cracks root. Installs
> rootkit to hide his/her subsequent actions, replacing many local
> binaries with trojaned substitutes, including /usr/bin/ssh and the
> kernel console driver. $USER logs in, and in due course sshes outbound
> to host2. A week later, $BADUSER, in rummaging through other captured
> data, notices and stows away $USER's outbound access information,
> including ssh private key and passphrase (from logged console data).
> $BADUSER now sshes to host2, scps over his/her 'sploit collection,
> cracks root, and repeats the cycle.
>
> Please notice how this regimen works for $BADUSER almost as easily and
> routinely with public keypair authentication as with ssh passwords, even
> if the sysadmins and users do all key-handling steps correctly.
Yes, tricky problem. Requiring a key prevents
the simplest form of the problem of using the same
password on two systems, but you can't keep a user
from putting the same key on two systems.
Is there a way for you, the administrator of the
server, to tell ssh hopping, like this:
ssh -At lron.example.edu ssh xenu.linuxmafia.com
from risky private key copying?
--
Don Marti
http://zgp.org/~dmarti/
dmarti at zgp.org
More information about the svlug
mailing list