Berkeley CSUA MOTD:Entry 21366
Berkeley CSUA MOTD
 
WIKI | FAQ | Tech FAQ
http://csua.com/feed/
2024/11/23 [General] UID:1000 Activity:popular
11/23   

2001/5/26-28 [Computer/SW/Security] UID:21366 Activity:insanely high
5/25    If IPv6 encrypts everything (IPSec) as part of the standard, does this
        mean protocols like ssh would no longer be required?  Will IPv6 allow
        telnet and ftp and other cleartext password protocols to live on?
        What use would there be for ssh if IPv6 was everywhere?
             \- i realize i am "begging the hypothetical" but the "if ipv6
             was everywhere [and interoperating nicely, with reasonable key
             management, and transparancy]" is a pretty big if. "if ksh does
             everything sh does and more, why do we still have sh?" etc. --psb
                \_ It's a good question.  I think the answer is mostly just
                   inertia and history.
        \_ there will always be a need for application-level security
           \_ What does ssh do for me that ipsec doesn't?  IPv6 encrypts, it
              compresses, QoS, and lots of other funs things.  What does ssh
              get me in a pure IPv6 world? (Yes, I know this will take a while
              to happen, that's not my query).  Don't get me wrong.  I love
              ssh and use it for all sorts of stuff.  I'm just not seeing a
              big role for it in IPv6.
              \_ Authentication?
                 \_ I think a telnet prompt with memorised password is better
                    auth than the keys-on-disk ssh standard auth.  I can steal
                    your private key.  I can't read your mind.
                \_ you can require a key on disk, and protect the
                   key with a passphrase
                    \_ Is stealing someone's private key easier than reading
                       their password out of the password file?
                        \_ Yes.  And can be more useful.
                    \_ Of course -my- private key is encrypted. Go ahead and
                       steal it. As for memorized password, it can be easily
                       stolen as well with a use of a trojaned client or
                       server, and I have seen this happen many times.
                        \_ So you unencrypt your key before each use?  Uh huh.
                           If the server or client is trojaned all is lost
                           anyway so it hardly matters what you use at that
                           point, does it?
                           \_ This is not true in general.  It's easy to
                              authenticate yourself without revealing
                              your private key.
                           \_ Yes, man ssh-agent. And if your are not using
                              ssh-agent, then yes, you need to decrypt the
                              key every time you use it. Ssh client does this
                              for you. And yes, this is more secure because
                              you don't have to send neither your password
                              nor your private key to the remote ssh server.
                                \_ I think you don't understand how ssh-agent
                                   or ssh itself works.  ssh-agent is a local
                                   key manager that makes it so you don't have
                                   to retype your passphrase over and over for
                                   each new connection.  Nothing more.  I'd
                                   like to hear your explanation of how it
                                   auths to the server without sending any
                                   info.
                                   \_ do you even know what PKI means?
                                      \_ Same question: how are you doing auth
                                         without sending someone something?
              \_ i was speaking more broadly, e.g. SSL too.  the main use
                 of app-level security is authentication and integrity
                 of data between app-level (not system-level) principals.
                 \_ Is something like app-level ssl necessary when the
                    underlying protocol (IPv6 in this case) deal with it?
                    \_ yes, particularly for distributed systems. not
                       only are there app-level principals that are not
                       known at the system level to auth/authz, but
                       you also want to reduce the extent of damage when
                       one part fails.
        \_ Agent system, agent forwarding, x11 forwarding...
        \_ BTW, IPSec has nothing to do with IPv6.  Implementations of both
           for *BSD systems happen to be codevelped by the same people
           (kame.net), but IPv6 !=, is not a superset of, does not imply,
           whathaveyou, IPSec.
           \_ Well, true, but what I read implied that IPv6 is assumed to use
              IPSec by default.
ERROR, url_link recursive (eces.Colorado.EDU/secure/mindterm2) 2024/11/23 [General] UID:1000 Activity:popular
11/23   

You may also be interested in these entries...
2012/8/26-11/7 [Computer/SW/Security] UID:54465 Activity:nil
8/26    Poll: how many of you pub/priv key users: 1) use private keys that
        are not password protected 2) password protect your private keys
        but don't use ssh-agent 3) use ssh-agent:
        1) .
        2) ..
        3) ...
	...
2012/8/29-11/7 [Computer/SW/Security] UID:54467 Activity:nil
8/29    There was once a CSUA web page which runs an SSH client for logging
        on to soda.  Does that page still exist?  Can someone remind me of the
        URL please?  Thx.
        \_ what do you mean? instruction on how to ssh into soda?
           \_ No I think he means the ssh applet, which, iirc, was an applet
              that implemented an ssh v1 client.  I think this page went away
	...
2012/8/7-10/17 [Computer/SW/Security] UID:54455 Activity:nil
8/6     Amazon and Apple have lame security policies:
        http://www.wired.com/gadgetlab/2012/08/apple-amazon-mat-honan-hacking/all
        "First you call Amazon and tell them you are the account holder, and
         want to add a credit card number to the account. All you need is the
         name on the account, an associated e-mail address, and the billing
         address. "
	...
2012/7/18-8/19 [Health/Men, Computer/SW/Security] UID:54438 Activity:nil
7/18    "Largest penis record holder arouses security suspicions at airport"
        http://www.csua.org/u/x2f (in.news.yahoo.com)
        \_ I often have that same problem.
        \_ I think the headline writer had some fun with that one.
           \_ One time when I glanced over a Yahoo News headline "U.S. busts
              largest-ever identity theft ring" all I saw was "U.S. busts
	...
2012/4/23-6/1 [Computer/SW/WWW/Browsers] UID:54360 Activity:nil
4/19    My Firefox 3.6.28 pops up a Software Update box that reads "Your
        version of Firefox will soon be vulnerable to online attacks."  Are
        they planning to turn off some security feature in my version of
        Firefox?
        \_ Not as such, no, but they're no longer developing this version,
           so if a 3.6.x-targeted hack shows up, you're not going to get
	...
2011/11/8-30 [Computer/SW/Security, Computer/SW/OS/Windows] UID:54218 Activity:nil
11/8    ObM$Sucks
        http://technet.microsoft.com/en-us/security/bulletin/ms11-083
        \_ How is this different from the hundreds of other M$ security
           vulnerabilities that people have been finding?
           \_ "The vulnerability could allow remote code execution if an
               attacker sends a continuous flow of specially crafted UDP
	...
2011/11/11-30 [Computer/SW/Security] UID:54224 Activity:nil
11/11   MacOSX's Sandbox security hole:
        http://preview.tinyurl.com/7ph2wtg [arstechnica]
	...