a story of compromise and an idea

Ben Lindstrom mouring at etoh.eviladmin.org
Sat Feb 21 17:54:50 EST 2004



On Fri, 20 Feb 2004, John Meacham wrote:
[..]
>
> I was thinking that it would be a useful option to store a hash of the
> host/ip in known_hosts rather than the host/ip in plaintext so that
> there is not an immediate list of candidate machines to crack once an
> account is compromised. in the case of possible key-compromise, anything
> that slows down the attack long enough for you to hear about it and
> re-key is a good thing.  Plus, as a privacy thing, one might not want a
> list of the machines they connect to so obviously logged.
>

Sure there is.. commandline history and last login history.  Both can be
checked automaticly.  None of which are affected by having some hashed
known_host file and at least one is OUT of your control.

To say nothing about existing sessions that are active.

- Ben






More information about the openssh-unix-dev mailing list