Re: FAS and public Key auth

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Thu, May 22, 2008 at 10:19:54AM -0500, Mike McGrath wrote:

> I know your private key doesn't touch the wire or remote system.  But the
> agent creates a socket in /tmp/ssh-* and I'm worried someone with access
> to that socket could auth to other machines as the user.

The agent *isn't* forwarded by default, you need to use either -A in the
command line or ForwardAgent yes in the config. Of course nothing stops
users from enabling agent forwarding by default but then again nothings
stops them from doinf other stupid things with ssh keys, having passwordless
keys and keeping a copy of them in some insecure location is one of the
worst examples.

For the people having agent forwarding enabled by default you already
have a problem with all the other machines that they connect anyway for
their daily work/whatever.

Running a kerberos server is a good alternative to ssh pubkey auth, you
can enforce centrally non forwardable tickets if you want so you can be
sure that other machines that the user authenticates with cannot connect
back to the fedora servers. 

Kostas Georgiou

_______________________________________________
Fedora-infrastructure-list mailing list
Fedora-infrastructure-list@xxxxxxxxxx
https://www.redhat.com/mailman/listinfo/fedora-infrastructure-list

[Index of Archives]     [Fedora Development]     [Fedora Users]     [Fedora Desktop]     [Fedora SELinux]     [Yosemite News]     [KDE Users]

  Powered by Linux