SSH, or secure shell, is the standard protocol for remotely accessing UNIX
systems. It's used everywhere: universities, laboratories, and corporations
(particularly in data-intensive back office services). Thanks to SSH,
administrators can stack hundreds of computers close together into
air-conditioned rooms and administer them from the comfort of their desks.

When a user's SSH client first establishes a connection to a remote server,
it stores the name of the server and its public key in a known_hosts
database. This database of names and keys allows the client to more easily
identify the server in the future.

There are risks to this database, though. If an attacker compromises the
user's account, the database can be used as a hit-list of follow-on targets.
And if the attacker knows the username, password, and key credentials of the
user, these follow-on targets are likely to accept them as well.

A new paper from MIT explores the potential for a worm to use this infection
mechanism to propagate across the Internet. Already attackers are exploiting
this database after cracking passwords. The paper also warns that a worm
that spreads via SSH is likely to evade detection by the bulk of techniques
currently coming out of the worm detection community.

< snip >

http://www.schneier.com/blog/archives/2005/05/the_potential_f.html

The MIT paper and project site:
http://nms.csail.mit.edu/projects/ssh/



You are a subscribed member of the infowarrior list. Visit 
www.infowarrior.org for list information or to unsubscribe. This message 
may be redistributed freely in its entirety. Any and all copyrights 
appearing in list messages are maintained by their respective owners.

Reply via email to