[GRLUG] Linux Systems Compromised

networkman at triton.net networkman at triton.net
Tue Aug 19 00:30:52 EDT 2008


> Very interesting, but rootkits are nothing new.  They've existed for
> well over ten years now; What's interesting about this is the breaking
> of the web of trust.  One rooted system gave access to SSH keys that
> gave access to more systems, which garnered more SSH keys.  It's worth
> noting that a properly-setup
>
> This makes me wonder about the wisdom of using ssh keys to bypass
> password restrictions.  It's obviously safer to use ssh keys with
> passwords tied to them.
>
> --
> :wq

Yes, I was thinking the same thing.. wondering why someone would rely on
SSH keys alone?  Of course, I'm not even pretending that I was able to
follow all of the message that was provided either, but I've been involved
with various DC projects to break encryption at varying levels just to
prove it can be done, given a) enough time, or b) a way to come up with a
short-cut. ;)

Rich




More information about the grlug mailing list