Security of ssh across a LAN, public key versus password
David Lang
david at lang.hm
Thu Oct 24 01:30:29 AEDT 2024
Jochen Bern wrote:
> Subverting your workplace machine - the same account you log in as, or even a
> superuser - gives the attacker a lot of possibilities, essentially getting
> his hands on all data that passes through that computer, from keystrokes to
> (before-/after-encryption) network communication to the contents of your
> screen. If that's a scenario probable enough to make it a concern, and the
> consequences for the other hosts in your LAN important enough to consider,
> the question to answer is not "which auth protocol spoken *by the subverted
> machine* is a bit harder to catch as well" but "how do get I get the relevant
> secrets *off* that machine and into an *actually* secure location".
I will say that there have been a lot of cases of org having all of their
machines accessible via SSH (with certs) from the Internet, only to have
attackers roam freely through them after an admin laptop is compromised. You
need soe other security mechanism that can't be copied and used from an
unapproved system (this could be location/IP based, but people are too mobile
for that nowdays, so using something off the machine is needed)
and given that people want to use mobile devices for access, relying on
messages/apps on the mobile device is not that good.
David Lang
-------------- next part --------------
_______________________________________________
openssh-unix-dev mailing list
openssh-unix-dev at mindrot.org
https://lists.mindrot.org/mailman/listinfo/openssh-unix-dev
More information about the openssh-unix-dev
mailing list