On Tue, Jan 08, 2008 at 10:48:41AM -0500, Douglas A. Tutty wrote:
> I suppose the only way to have a "trusted-secure" box and an
> "untrusted-insecure" box with one disply/keyboard would be a KVM.
This is pretty much the case - depends on what you want to trust. If you
trust the X server and the OS kernel, you can run a separate X server
for another user, or VNC, which is somewhat safer than X clients sharing
one X server (but VNC clients can and do have bugs).

In any case, if you want to interact with an online bank you will always
have to trust something to communicate over the network. It's all about
what you want to defend against and what kind of usablility degradation
you want to accept.

> Please tell me that there's no way for a compromised box to do keystroke
> monitoring of a kvm.
With a mechanical one you are safe, but all usable KVM switches have a
CPU and software - you don't get the source, and you have no choice but
to trust it. In the case of USB the software is probably pretty complex
and could very well contain exploitable bugs. I wouldn't be surprised if
some KVMs had flash, which would allow complete compromise of it if you
found a way to run code on it.

Actual, physical separation of the machines is the only 100% secure way
to prevent information from leaking between them. I'd be more worried
about the network cable between them than a KVM, though.

You also shouldn't forget yet another link between the machines - the
user. I've typed passwords and other sensitive things to the wrong
machine more than once when tired, and a KVM probably makes that much
easier than having separate machines that are far enough from each other
so that you can't look at the wrong screen while typing (if they are
next to each other, a KVM is better than the confusion of having 2
keyboards).

-- 
Jussi Peltola

Reply via email to