[Info-vax] OpenVMS V9.0-C Released July 29th

Phillip Helbig undress to reply helbig at asclothestro.multivax.de
Tue Aug 4 01:45:56 EDT 2020


In article <rgap56$e2s$2 at dont-email.me>, Simon Clubley
<clubley at remove_me.eisner.decus.org-Earth.UFP> writes: 

> On 2020-08-03, Phillip Helbig (undress to reply) <helbig at asclothestro.multivax.de> wrote:
> >
> > (and a DECnet proxy is no worse than having an 
> > SSH key in place).
> >
> 
> Huh ???
> 
> SSH keys are an excellent example of a shared secret - you need to
> steal the shared secret before you can even think of impersonating
> a person/node.
> 
> DECnet proxies OTOH are an absolute joke in today's world and may
> even be worse then sending the password in the clear. This is because
> there are no shared secrets between DECnet nodes.
> 
> As such, there is _no_ impersonation protection with DECnet proxies.
> All you need is the DECnet address of the node you wish to impersonate.
> 
> IOW, anyone can pretend to be an existing DECnet proxy node.

Yes, but that assumes that the bogus node is on the same network, which, 
today, is extremely improbable.  Back in the days when DECnet was 
routed, sure.

My point was that an SSH key is essentially equivalent to a password in 
clear text on the disk.  OK, it's longer so one can't remember it at a 
glance, but this is protection only against the glance-over-the-shoulder 
tactic, which is definitely NOT how most passwords are stolen these 
days.

Yes, the problem is that some sites store passwords in clear text.  
However, here the situation is that one has access to one system on the 
network and can thus access others---doesn't matter if the password is 
on the disk, there is a proxy, there is an SSH key, or whatever.




More information about the Info-vax mailing list