On 03/01/12 18:57, Russell Coker wrote:
> On Fri, 2 Mar 2012, Jordon Bedwell <envyge...@gmail.com> wrote:
>>> Run the command below.
>>>
>>>  grep "ssh:1.%.30s@%.128s.s password:" /usr/sbin/sshd; echo $?
>>>
>>> If you don't get 1 as output, your sshd is compromised.
>> It returned 1, this happens on freshly installed Debian and Ubuntu too
>> though, tested it on Ubuntu too.
> http://etbe.coker.com.au/2011/12/31/server-cracked/
>
> If you havd a sshd that is compromised in the same way as one was on one of 
> my 
> servers then Anibal's command will give an output of 0.
>
> I don't know what relevance this has to a discussion of OpenSSH logging 
> though.
>
> I'd like to have OpenSSH log the email address field from a key that was used 
> for login so I could see something like "ssh key russ...@coker.com.au was 
> used 
> to login to account rjc" in my logs.
>
>From what I know that information(the comment on the key) is not vary
secure, Joe could put Bob as his comment...

However one could so a look-up on the key from a key-server and get the
email address that way.  This is assuming that ppl are using there
gpg(email) keys for ssh.


-- 
To UNSUBSCRIBE, email to debian-security-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/4f502dff.1050...@mikemestnik.net

Reply via email to