home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Columbia Kermit
/
kermit.zip
/
newsgroups
/
misc.19990725-20000114
/
000153_news@columbia.edu _Tue Oct 5 18:24:16 1999.msg
< prev
next >
Wrap
Internet Message Format
|
2020-01-01
|
3KB
Return-Path: <news@columbia.edu>
Received: from newsmaster.cc.columbia.edu (newsmaster.cc.columbia.edu [128.59.59.30])
by watsun.cc.columbia.edu (8.8.5/8.8.5) with ESMTP id SAA25514
for <kermit.misc@watsun.cc.columbia.edu>; Tue, 5 Oct 1999 18:24:16 -0400 (EDT)
Received: (from news@localhost)
by newsmaster.cc.columbia.edu (8.8.5/8.8.5) id SAA02973
for kermit.misc@watsun.cc.columbia.edu; Tue, 5 Oct 1999 18:09:27 -0400 (EDT)
X-Authentication-Warning: newsmaster.cc.columbia.edu: news set sender to <news> using -f
From: jaltman@watsun.cc.columbia.edu (Jeffrey Altman)
Subject: Re: Kermit 95 as an ssh client?
Date: 5 Oct 1999 22:09:26 GMT
Organization: Columbia University
Message-ID: <7tdsum$2sp$1@newsmaster.cc.columbia.edu>
To: kermit.misc@columbia.edu
In article <7tdqq7$6se$1@vixen.cso.uiuc.edu>,
Adam H. Lewenberg <adam@symcom.math.uiuc.edu> wrote:
: Kermit 95 is _almost_ perfect. The last feature I would really like is
: for kermit to act as an ssh client.
:
: Any chances of this happening in the near future?
Adam:
Its interesting that you are asking this question (again).
I replied to you on 1 October 1998 in detail as to why the Kermit
Project could not support SSH. In the last year absolutely nothing
has changed. The RSA patent is still valid and SSHv2 has still
not been approved by the IETF.
In addition, it has become clear that SSH, when used with
Public Key authentication, is a security nightmare when it is used
and the client machine becomes compromised. While it may be an
acceptable risk for individual users, it is not an acceptable risk
for a system that supports thousands of users. When a host becomes
root compromised all of the public key files that are found in the
home directories of users may be accessed and used to break into
additional machines. Unlike every other authentication mechanism
the SSH public keys cannot be revoked and their reuse cannot be
prevented.
As for using SSH to simply prevent the transmission of plain text
passwords, this only prevents a passive sniffer attack. It does not
prevent an active man in the middle attack, nor does it protect against
a root compromised host stealing passwords when a compromised login
program is installed. Passwords should never be sent across the network.
Not when truly secure systems are so easily accessible:
. Secure Remote Password and other Zero Knowledge based systems
. Kerberos varients
. One Time Pads.
While we may very well implement SSHv2 when it is finished, it will
be only with very strong warnings against its use.
Jeffrey Altman * Sr.Software Designer * Kermit-95 for Win32 and OS/2
The Kermit Project * Columbia University
612 West 115th St #716 * New York, NY * 10025
http://www.kermit-project.org/k95.html * kermit-support@kermit-project.org