> What exactly do you think "untrusted" means in the phrase "untrusted
> host"?

That anything and everything will be captured and logged in plain
text.  That's what _I_ consider "untrusted".  Everything including
the login credentials, but they're a one-time thing.  Right?  Is
that not the case?

What am I missing here?  This is a very simple question...  In the
following sequence, where do I go wrong?

1)  Log into system via ssh skey, which is a one-time auth method
2)  Type 'sudo farfegnugen blahblah yadda'
3)  Log out

As I understand things, the attackers now have my one-time auth
info, which won't work again.  Right?

They also know I typed 'sudo fargegnugen blahblah yadda'.  Neato.

And they saw me log out.  So, they have an auth string that will
not work, a command that won't work unless they can log in as
me, and they now know how to log out.

I absolutely admit that I'm an idiot when it comes to this.  I
would just appreciate knowing the flaws in this particular plan.

Benny


-- 
"Now, that next spring you find in your garage a creature that
looks like a cross-bred badger and anaconda. A badgerconda."
                                                  -- bash.org

Reply via email to