On Wed, 28 Sep 2005 08:20:50 -0700, Donald J. Ankney wrote:

>On Sep 27, 2005, at 11:37 PM, Jurjen Oskam wrote:
>
>> On Tue, Sep 27, 2005 at 11:36:22PM -0500, C. Bensend wrote:
>>
>>> 1)  Log into system via ssh skey, which is a one-time auth method
>>> 2)  Type 'sudo farfegnugen blahblah yadda'
>>> 3)  Log out
>>
>> You're assuming that the keys you press are transmitted unmodified to
>> your server. Since the terminal is not under your control, there's
>> no reason why it can't send, e.g.,  "sudo rm -rf /" all by itself  
>> after
>> it sees you're logged in.
>>
>> And this is just one example.
>>
>> -- 
>> Jurjen Oskam
>>
>
>To take this a step further, the host os (untrusted Windows box)  
>could also inject malicious keystrokes into an SSH session. It  
>wouldn't be as easy an attack since the injection has to happen  
>between the keyboard and Putty (rather than just injecting into an  
>unencrypted stream), but it still presents an attack vector.
>
>You can put a live-cd together on a business card sized CD that will  
>fit in your wallet. Even if you end up with Knoppix instead of  
>OpenBSD, at least you know it's clean.
>
>
And if I own the internet cafe and have fitted keylogging hardware?

>From the land "down under": Australia.
Do we look <umop apisdn> from up over?

Do NOT CC me - I am subscribed to the list.
Replies to the sender address will fail except from the list-server.

Reply via email to