On Nov 29, 2007, at 11:04 AM, Michael O'Keefe wrote:
What does it matter ?
That user is exposed, nobody else is
And when that user has exposed credentials that would in turn grant
greater access to another system?
Say, for example, I exposed my login credentials. You log in to a
machine as me, and then:
1) try to sudo to root using my credentials.
2) look in my ~/.ssh/known-hosts file
3) connect to each of those hosts, banking on the fact that I either
used the same password on all of them, or they're all using the same
central authentication service
4) try to sudo to root on each of those systems using my credentials.
The potential for damage is great, if you capture the right user's
credentials.
Gregory
--
Gregory K. Ruiz-Ade <[EMAIL PROTECTED]>
OpenPGP Key ID: EAF4844B keyserver: pgpkeys.mit.edu
--
[email protected]
http://www.kernel-panic.org/cgi-bin/mailman/listinfo/kplug-list