Rootshell pages hacked

Adam D. McKenna adam at flounder.net
Mon Nov 2 15:17:08 UTC 1998


scp user at fromhost:file user at tohost:file
Enter passphrase for RSA key:

:)

The coolest thing about scp is that you don't have to be ON fromhost to copy
files between it and tohost.  If passwords or RSA authentication passphrases
are needed you will be prompted for them by scp.

It's also interesting to note that there is no unix password needed for ssh
with RSA auth.  Your password field in /etc/shadow can be "*" or "!" or
whatever your particular OS uses to signify an account which has a locked
password.

--Adam

-----Original Message-----
From: Adam Rothschild <asr at millburn.net>
To: nanog at merit.edu <nanog at merit.edu>
Date: Monday, November 02, 1998 10:05 AM
Subject: Re: Rootshell pages hacked


On Mon, 2 Nov 1998, Alex P. Rudnev wrote:

> problem, UNIX one-time passwords are real problem. Another bad problem is
> _the same UNIX password for all purposes_ - I can sniff your FTP password
> and use it for SSH access (for example).

Very true.  Then again, FTP'ing in cleartext is kinda stupid in and of
itself.  Why not just FTP thru an SSH tunnel?  Or, if you're up for
an adventure (and a not-totally-complete(TM) spec), try the secure file
xfer stuff in SSH2...








More information about the NANOG mailing list