Connection caching?

Damien Miller djm at mindrot.org
Tue May 4 12:09:20 EST 2004


Jefferson Ogata wrote:

> Um, I feel like you're missing the point. I can prevent users from using 
> ssh-agent by not providing the binary and by not giving them write access to any 
> exec filesystem. I can also require authentication mechanisms on the server side 
> that ssh-agent cannot answer, e.g. one-time passwords. The mechanism under 
> discussion is not amenable to any of these controls. Once someone authenticates 
> once, if that user's remote session is compromised, the intruder can piggyback 
> over any established ssh connection and there is absolutely no way I can force 
> the intruder to authenticate. Do you understand? You're advocating a mechanism 
> that renders one-time passwords useless against a remote client compromise. 

You miss the point: these controls are useless now, if they depend on
the integrity of an uncontrolled client.

> That's fine for you, but not for me: I need to be able to turn that off on the 
> ssh server.

So write a patch.

-d




More information about the openssh-unix-dev mailing list