Subject: Re: setuid ssh
To: Atsushi Onoe <onoe@sm.sony.co.jp>
From: Bill Sommerfeld <sommerfeld@orchard.arlington.ma.us>
List: tech-security
Date: 10/18/2000 09:38:44
  by mail.netbsd.org with SMTP; 18 Oct 2000 13:38:51 -0000
	id 2EB5C2A2A; Wed, 18 Oct 2000 09:38:49 -0400 (EDT)
	by orchard.arlington.ma.us (Postfix) with ESMTP
	id D640B1FCD; Wed, 18 Oct 2000 09:38:49 -0400 (EDT)
To: Atsushi Onoe <onoe@sm.sony.co.jp>
Cc: atatat@atatdot.net, cjs@cynic.net,
	hubert.feyrer@informatik.fh-regensburg.de, tech-security@netbsd.org
Subject: Re: setuid ssh 
In-Reply-To: Message from Atsushi Onoe <onoe@sm.sony.co.jp> 
   of "Wed, 18 Oct 2000 22:26:21 +0900." <200010181326.e9IDQLv03069@duplo.sm.sony.co.jp> 
Reply-To: sommerfeld@orchard.arlington.ma.us
Date: Wed, 18 Oct 2000 09:38:44 -0400
From: Bill Sommerfeld <sommerfeld@orchard.arlington.ma.us>
Message-Id: <20001018133849.2EB5C2A2A@orchard.arlington.ma.us>

> I think .rhosts/rsa configuration may still be suitable for some
> enviroment; e.g. remote backup from cron.  Perhaps you want to set
> IgnoreUserKnownHosts.

for backups, you can create a passphraseless trusted key in
~backup/.ssh and get roughly the same security properties without
requiring the ssh client to be setuid.

> I'm afraid that disabling all authentication other than user's RSA
> causes proliferation of ssh-agent, which looks more halmful than
> rhosts/rsa authentication.

the difference is that ssh-agent can be turned off when the user is
not present; this is not the case for .rhosts/rsa.

					- Bill