a story of compromise and an idea
Ben Lindstrom
mouring at etoh.eviladmin.org
Sat Feb 21 17:54:50 EST 2004
On Fri, 20 Feb 2004, John Meacham wrote:
[..]
>
> I was thinking that it would be a useful option to store a hash of the
> host/ip in known_hosts rather than the host/ip in plaintext so that
> there is not an immediate list of candidate machines to crack once an
> account is compromised. in the case of possible key-compromise, anything
> that slows down the attack long enough for you to hear about it and
> re-key is a good thing. Plus, as a privacy thing, one might not want a
> list of the machines they connect to so obviously logged.
>
Sure there is.. commandline history and last login history. Both can be
checked automaticly. None of which are affected by having some hashed
known_host file and at least one is OUT of your control.
To say nothing about existing sessions that are active.
- Ben
More information about the openssh-unix-dev
mailing list