Date: Fri, 22 Mar 2002 14:21:02 +1000 (EST) From: Steven Goodwin <steve@cit.gu.edu.au> To: security@FreeBSD.ORG Subject: Re: Safe SSH logins from public, untrusted Windows computers Message-ID: <Pine.GSO.3.96.1020322141921.29070I-100000@kurango.cit.gu.edu.au> In-Reply-To: <Pine.GSO.3.96.1020322140057.29070G-100000@kurango.cit.gu.edu.au>
next in thread | previous in thread | raw e-mail | index | archive | help
> Without wanting to prolong the wacky ideas thread too much further, how > about using the screen port (/usr/ports/misc/screen). Logged on at a > secure terminal, you could start a screen session, su to root, then detach > (ctrl+a+d). When you are on travels, simply log in (using a particular > method described on this thread) to your remote machine as the user that > owns the screen session, re-attach the session (screen -r) and > viola, root access without passwords. Simple, but useless if the remote > machine has been rebooted while you were away. Wacky. > > Steve Oh yeah, you might also have an issue with leaving a root terminal available to those that comprimise your user account. Ouch. Steve To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.GSO.3.96.1020322141921.29070I-100000>