Wednesday, October 26, 2005

System Administrators - Why SSH 1 isn't enough to provide security.

Some server administrators think that using SSH is more than enough. Not so. There are many exploits in SSH 1 and SSH2 is much better.

From RHEL Security Manual

Although an administrator may have a fully secure and patched server, that does not mean remote users are secure when accessing it. For instance, if the server offers Telnet or FTP services over a public network, an attacker can capture the plain text usernames and passwords as they pass over the network, and then use the account information to access the remote user's workstation.

Even when using secure protocols, such as SSH, a remote user may be vulnerable to certain attacks if they do not keep their client applications updated. For instance, v.1 SSH clients are vulnerable to an X-forwarding attack from malicious SSH servers. Once connected to the server, the attacker can quietly capture any keystrokes and mouse clicks made by the client over the network. This problem was fixed in the v.2 SSH protocol, but it is up to the user to keep track of what applications have such vulnerabilities and update them as necessary.

0 Comments:

Post a Comment

Links to this post:

Create a Link

<< Home