<html><head></head><body>Bad person gets user access. Then uses ssh key to access another system the compromised user has sudo on. Bad person doesn't have sudo access unless they have compromised user's password or sysadmin gave out no password sudo.<br><br><div class="gmail_quote">On November 4, 2019 4:57:28 PM EST, Byron Jeff via Ale <ale@ale.org> wrote:<blockquote class="gmail_quote" style="margin: 0pt 0pt 0pt 0.8ex; border-left: 1px solid rgb(204, 204, 204); padding-left: 1ex;">
<pre class="k9mail">I thought the same in the first minute, but realized that it doesn't add<br>any operational security. If machine A, user B is compromised (B@A) and<br>B's key's are used to login to B@C using keys, and B has sudo access, then it's<br>trivial for the hacker to login to B@C, change B's password on C, then use<br>it to gain root access on C.<br><br>I almost start to wonder if passwordless keys really improve security.<br><br>BAJ<br><br>On Mon, Nov 04, 2019 at 04:10:41PM -0500, dj-pfulio via Ale wrote:<br><blockquote class="gmail_quote" style="margin: 0pt 0pt 1ex 0.8ex; border-left: 1px solid #729fcf; padding-left: 1ex;"><blockquote class="gmail_quote" style="margin: 0pt 0pt 1ex 0.8ex; border-left: 1px solid #ad7fa8; padding-left: 1ex;"><blockquote class="gmail_quote" style="margin: 0pt 0pt 1ex 0.8ex; border-left: 1px solid #8ae234; padding-left: 1ex;">directly. Perhaps 2006? First thing I do on any new machine is add an<br>account with sudo rights.<br></blockquote><br>I don't see the operational difference between ssh'ing into root (using a<br>key) and ssh'ing into another account using a key and then sudo'ing to<br>root. You're still getting into the machine via a key?<br><br></blockquote><br>2 authentication levels seems to be better than 1, but everyone has different requirements.<hr>Ale mailing list<br>Ale@ale.org<br><a href="https://mail.ale.org/mailman/listinfo/ale">https://mail.ale.org/mailman/listinfo/ale</a><br>See JOBS, ANNOUNCE and SCHOOLS lists at<br><a href="http://mail.ale.org/mailman/listinfo">http://mail.ale.org/mailman/listinfo</a><br></blockquote></pre></blockquote></div><br>-- <br>Sent from my Android device with K-9 Mail. All tyopes are thumb related and reflect authenticity.</body></html>