[GRLUG] Linux Systems Compromised
rh90p at comcast.net
rh90p at comcast.net
Tue Aug 19 01:54:39 EDT 2008
I hadn't considered that someone would be "using ssh keys to bypass password restrictions". I can't imagine that if someone were doing that, they would do that much of it and therefore presumed that they had some way to figure the passwords given the keys. The description isn't clear about it.
-------------- Original message ----------------------
From: networkman at triton.net
> > Very interesting, but rootkits are nothing new. They've existed for
> > well over ten years now; What's interesting about this is the breaking
> > of the web of trust. One rooted system gave access to SSH keys that
> > gave access to more systems, which garnered more SSH keys. It's worth
> > noting that a properly-setup
> >
> > This makes me wonder about the wisdom of using ssh keys to bypass
> > password restrictions. It's obviously safer to use ssh keys with
> > passwords tied to them.
> >
> > --
> > :wq
>
> Yes, I was thinking the same thing.. wondering why someone would rely on
> SSH keys alone? Of course, I'm not even pretending that I was able to
> follow all of the message that was provided either, but I've been involved
> with various DC projects to break encryption at varying levels just to
> prove it can be done, given a) enough time, or b) a way to come up with a
> short-cut. ;)
>
> Rich
>
>
> _______________________________________________
> grlug mailing list
> grlug at grlug.org
> http://shinobu.grlug.org/cgi-bin/mailman/listinfo/grlug
More information about the grlug
mailing list