Security of ssh across a LAN, public key versus password

Jochen Bern Jochen.Bern at binect.de
Thu Oct 24 00:45:00 AEDT 2024


On 21.10.24 20:26, Chris Green wrote:
> I have a small LAN at home with nine or ten systems on it running
> various varieties of Linux.  I 'do things' on the LAN either from my
> dekstop machine or from my laptop, both run Xubuntu 24.04 at the
> moment.
> 
> There's a couple of headless systems on the LAN where login security
> is important to me and I've been thinking about the relative merits of
> password and public-key authentication.
> 
> [...] If someone 'breaks in' (in the physical or computer sense) to my
> desktop then how might they attack another system on the LAN? [...]
> 
> [...] If I went back to all passwords life would be so much easier!

As has already been pointed out, if someone manages to break into your 
workplace machine, the (past) security of the rest of the network is 
usually not the most pressing concern, much less your only one. But 
let's stick to that, for the sake of the argument.

Subverting your workplace machine - the same account you log in as, or 
even a superuser - gives the attacker a lot of possibilities, 
essentially getting his hands on all data that passes through that 
computer, from keystrokes to (before-/after-encryption) network 
communication to the contents of your screen. If that's a scenario 
probable enough to make it a concern, and the consequences for the other 
hosts in your LAN important enough to consider, the question to answer 
is not "which auth protocol spoken *by the subverted machine* is a bit 
harder to catch as well" but "how do get I get the relevant secrets 
*off* that machine and into an *actually* secure location".

Thanks to Yubikeys and similar devices, that is actually feasible, but 
it also makes it quite clear why *then* using keypair auth is vastly 
preferable: A password still needs to travel through the insufficiently 
secure machine whenever you use it, and can get snarfed there; a private 
key, on the other hand, never leaves the extra device and the worst the 
attacker can achieve is to *somehow* piggyback onto *your* activity 
(which will definitely not be as easy as copy-pasting a password out of 
a data stream recorded way-back-when).

>> do people use a password manager
> Not for passwords, I remember all the ones I use a lot.

Then I have a thought experiment for you: Let's assume that you found 
your workplace machine to be hacked and are now busy setting up a new 
one from scratch. Which of these two subtasks sounds easier to do:

a) Create new keypairs, possibly reusing the old passphrases for them 
(because either you succeeded in making the new setup more secure, then 
reusing the passphrases won't matter, or you didn't, then the attacker 
would likely eavesdrop new ones soon-ish, anyway)

b) Replace *every* password and *memorize* them all, preferably from one 
day to the next

Kind regards,
-- 
Jochen Bern
Systemingenieur

Binect GmbH
-------------- next part --------------
A non-text attachment was scrubbed...
Name: smime.p7s
Type: application/pkcs7-signature
Size: 4336 bytes
Desc: S/MIME Cryptographic Signature
URL: <http://lists.mindrot.org/pipermail/openssh-unix-dev/attachments/20241023/64acff86/attachment.p7s>


More information about the openssh-unix-dev mailing list