Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 22 Mar 2002 14:10:29 +1000 (EST)
From:      Steven Goodwin <steve@cit.gu.edu.au>
To:        security@freebsd.org
Subject:   Re: Safe SSH logins from public, untrusted Windows computers
Message-ID:  <Pine.GSO.3.96.1020322140057.29070G-100000@kurango.cit.gu.edu.au>
In-Reply-To: <3C97BDE4.8040301@nisser.com>

next in thread | previous in thread | raw e-mail | index | archive | help


On Tue, 19 Mar 2002, Roelof Osinga wrote:

> Richard Ward wrote:
> > Chris Johnson,
> > ...
> > If I could shoot a really crazy idea your way: What about using the
> > "Character Map" program included with Windows to slowly "type" out your
> > password? Though that would probably be cached long before you overwrite the
> > Clipboard.
> 
> Since we're talking about wacky ideas, whatever happened to the one I'm
> about to state: "keypress timing". Well, maybe nobody ever thought of it,

Without wanting to prolong the wacky ideas thread too much further, how
about using the screen port (/usr/ports/misc/screen).  Logged on at a
secure terminal, you could start a screen session, su to root, then detach
(ctrl+a+d).  When you are on travels, simply log in (using a particular
method described on this thread) to your remote machine as the user that
owns the screen session, re-attach the session (screen -r) and
viola, root access without passwords.  Simple, but useless if the remote
machine has been rebooted while you were away.  Wacky.

Steve 



To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.GSO.3.96.1020322140057.29070G-100000>