I hadn't thought of this attack.  Must be running a bit slow today.  Thanks.

-Matt

--On Thursday, September 20, 2001 4:16 PM -0400 "Robert W. Brewer" 
<[EMAIL PROTECTED]> wrote:

> I'm logged in on host Alice, which is my personal workstation and
> is assumed very secure.  :)  Now I ssh to host Maverick which
> I have an account on but which could have been broken into, or
> maybe just has a sysadmin that I don't trust.
> I think the idea is that Maverick could initiate an
> ssh connection to host Bob which I'm allowed to ssh into,
> and use my ssh-agent port (forwarded from my originating host Alice to
> Maverick) to respond to the authentication challenge from Bob.
> Now the root user on Maverick has gained acess to Bob as me.
> The root user on Maverick would not get access to my
> private key material residing in the ssh-agent
> on Alice, but he would gain access to all my files on Bob, which
> would be bad.  He would only gain access for one session,
> but one session is enough to install a back door to allow
> him to get in anytime after that.





---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to