Connection caching?
Jefferson Ogata
Jefferson.Ogata at noaa.gov
Tue May 4 10:37:30 EST 2004
Damien Miller wrote:
> Jefferson Ogata wrote:
>>My previous comment was poorly worded. I understand from other postings
>>that the server has the capability for multiple sessions. I'm saying
>>please provide a server option to disable that. Are you saying there
>>exists such an option?
>
> No such option exists, unless you include "Protocol=1" :)
>
> I don't think an option makes sense anyway. If you have the ability
> to compromise a client, then you can execute such an attack right now.
I don't know what you mean. If the client doesn't support the option,
all you can do is take over an existing session -- say, via ptrace or
pty hijacking -- and this would be difficult to pull off in general,
especially undetected. In any case, this is a totally different attack
that can be mitigated in other ways.
It's hard enough to keep lazy users from eliminating any challenge from
normal pubkey authentication by using ssh-agent or unpassphrased private
keys. But there are ways to force clients to be intelligent for
authentication. It's a different ball of wax once you start allowing a
single authentication phase provide a perpetual stream of sessions.
--
Jefferson Ogata <Jefferson.Ogata at noaa.gov>
NOAA Computer Incident Response Team (N-CIRT) <ncirt at noaa.gov>
More information about the openssh-unix-dev
mailing list