Connection caching?
Jefferson Ogata
Jefferson.Ogata at noaa.gov
Thu May 6 02:01:24 EST 2004
Ben Lindstrom wrote:
> On Wed, 5 May 2004, Jefferson Ogata wrote:
>>Now you add connection caching, and the compromise is no longer contained. If
>>the user is legitimately logged from the gateway into the secure system, the
>>intruder can now log in to the secure system, as many times as he likes.
>
> I think Damien/Markus would agree when I say that the user would have to
> enable such a thing for it to be used. Either via a ssh_config or via
> a commandline option. Much like how X11 sessions are.
>
> Why would a user do such a thing on a machine as you describe? What gain
> do they get? I see none.
No doubt the lazy user /would/ enable such a thing. The control needs to be on
the server side.
--
Jefferson Ogata <Jefferson.Ogata at noaa.gov>
NOAA Computer Incident Response Team (N-CIRT) <ncirt at noaa.gov>
More information about the openssh-unix-dev
mailing list