LinuxQuestions.org
Welcome to the most active Linux Forum on the web.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 09-09-2003, 12:26 PM   #1
KnightAzul
LQ Newbie
 
Registered: Sep 2003
Posts: 4

Rep: Reputation: 0
Newbie and SSH Security


Hi,

The rule of thumb seems to be don't let 'root' login under ssh. ssh login via a normal account and then 'su' to 'root'. Ok great ... but ...

Basically, it looks like a remote SSH connection always maintains the same SSH_TTY parm. So if I log in as 'another' and then 'su' to 'root', 'another' will remian the owner of the device SSH_TTY. Isn't this a security risk???

Any other login (or hacker) of 'another' logged in can now access the SSH_TTY of root and send some nasty control characters.

Many thanks for any advice!
Tony
 
Old 09-09-2003, 01:05 PM   #2
log
Member
 
Registered: Dec 2002
Location: South Australia
Distribution: Gentoo
Posts: 113

Rep: Reputation: 15
Thats a good question. Although SSH does offer encryption so I dont think its as easy as you make it out to be.
 
Old 09-09-2003, 01:35 PM   #3
KnightAzul
LQ Newbie
 
Registered: Sep 2003
Posts: 4

Original Poster
Rep: Reputation: 0
ok, but assuming someone (a hacker) has gotten the password of the 'another' account. The ssh encryption will not stop this hacker from being able to access the SSH_TTY device, since this user is perfectly able to access their own files.

Then, if by chance the legitimate user 'another' decides to 'su' to 'root' ... the hacker could easily send commands to 'root''s screen:

cat "hello" >> /dev/ttypa2

However, I guess "hello" would not be the hacker's first step!

Tony
 
Old 09-11-2003, 06:37 PM   #4
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415
Blog Entries: 55

Rep: Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600
ok, but assuming someone (a hacker) has gotten the password of the 'another' account. The ssh encryption will not stop this hacker from being able to access the SSH_TTY device, since this user is perfectly able to access their own files.

Hmm. How can you contribute the effects of abusing a compromised account to what is "regular" OpenSSH behaviour?
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
security newbie, but not Linux newbie. advice on secure delete tools mattie_linux Linux - Security 19 08-15-2005 01:50 AM
SSH Security pembo13 Linux - Security 20 09-13-2004 09:03 PM
security on ssh spank Linux - Security 1 02-26-2004 02:22 PM
ssh security ashley75 Linux - General 7 09-19-2003 11:15 AM
SSH Security 1jamie Linux - Security 2 09-08-2003 01:39 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 06:06 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration