]] Philipp Kern 

> On Sun, Jul 27, 2014 at 08:40:03AM -0700, tony mancill wrote:
> > It seems like with Ganneff's trigger mechanism, one attack vector is to
> > steal a backup of the passphraseless key and spoof the source IP - now
> > you can run the trigger at will.  Having a passphrase on the key could
> > at least slow the attacker down.  I could imagine using ssh-cron
> > together with "command=" for a higher level of security.
> 
> Uhm, spoof the source IP? This is not UDP, you'd also need to get traffic back
> redirected to you.

That's harder and more visible, but not impossible.  BGP hijacks do
happen, intentionally and not.

-- 
Tollef Fog Heen
UNIX is user friendly, it's just picky about who its friends are


-- 
To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/87wqayd40p....@xoog.err.no

Reply via email to