⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 deslogin.1

📁 一个使用des加密传输的unix下的login程序的服务器端和客户端
💻 1
字号:
.\" @(#) $RCSfile$ $Revision: 1.3 $ $Date: 94/06/14 11:59:36 $.TH DESLOGIN 1  14-Jun-94.ds )H David A. Barrett.ds ]W Rev. 1.1 June 1994.SH NAMEdeslogin \- DES authenticated and encrypted Network login.SH SYNOPSIS.B deslogin[.B \-dv] [.B \-g.I gateway] [ [ user\@]domain[:port] ].SH DESCRIPTION.PP.I Deslogin\^is a network login program similar to telnet but more secure.  Unliketelnet, it does not transmit passwords across the network.  Since passwords(actually pass phrases) may be arbitrarily long, they don't fall prey to password guessing attacks like the eight-character ones of telnet and login do..PP.I Desloginalso encrypts both directions of the data stream of the login session, sonetwork snooping cannot reveal sensitive information accessed during thesession (such as using the su command to become root).  Encryption also protects the connection from being hijacked..PP.I Desloginattempts to connect to the specified remote system as the specified user at the specified port.  If no system or user is given, .I desloginwill prompt you.  If no port is specified, the default onefrom /etc/services (usually 3005) is used.  If no user name is given, thelocal user name from.I (getlogin(3))is used..PP.I Desloginprompts you for a pass phrase.  This phrase, known only toyou and the remote machine, is used to authenticate your identity tothe remote host.  You may use an arbitrarily long sequence of charactersfor the phrase.  I find that short sentences make excellent easy-to-usechoices..PPIf the authentication is successful, you will be logged into the remotehost with your standard shell, user-id, and environment.  All informationtransmitted or received from the remote host is encrypted using the United States Data Encryption Standard in cipher-feedback mode.  The dataencryption key is unique for each.I deslogin invocation.  This prevents playback attacks and drastically reduces the time the login passphrase is subject to attack.If any part of authentication fails, .I desloginexits without comment..PPOften (almost always), the remote host will place an inactivity timer on your login session.This helps prevent the remote host from being compromised if you walk awayfrom your machine while a .I deslogin session is active.  Typically this timeris kept short (default is 20 minutes) to reduce the window of opportunity for someone walking up to your machine while you are away.  Don't leave .I desloginsessions unattended.  If you don't have any input/output going to yoursession for the inactivity period, the session is shut down immediately withoutwarning.  If the timeout is too short, talk to the installer of .I deslogind(3)on the remote host..SS Options.PP.TP 11.B  \-denable debug output (can't be used by attacker to compromise keys).TP.B  \-vVerbose mode.  Enable verbose output of messages..TP.BI \-g\ gatewaySpecifies a host:port to use as a gateway.  .I Desloginsessions can be routed through a gateway process installed on a "firewall" machine.  The :port is optional.  If not specified thedefault port from /etc/services (usually 3006) is used.  Firewalls often exist at entrances to secure networks.This option causes .I deslogin to prompt you for a gateway passphrase which is used toauthenticate yourself to the gateway.  This passphrase is probably different than the passphrase for thehost you are logging into.Once the gateway is satisfied of youridentity, it routes your login session to a remote machine, which will authenticate you and encrypts the session in the usual manner.  You haveno access to the gateway machine, and no user (even root) on the gatewaywill be able to examine information flowing through the gateway..SH WARNINGS.PPDo not leave .I desloginsessions unattended.  Someone can walk right up to your keyboard anddo anything you can..PPYou should take great care to preserve the secrecy of your passphrase(s).Don't let people watch the keyboard while you type in the passphrase; it's been done with telephone access cards with binoculars in airports!Don't write down your passphrase; pick a sentence that is easy for you toremember; any characters are allowed, including punction and spaces..PPAlways invoke .I deslogin on the local host.  Do not usetelnet (rlogin, xterm, etc.) to a remote machine, and then invoke .I desloginon that machine to get to another.  If you do, the keystrokes of your passphrase will appear on the network between the local and remote telnet hosts..PPOn machines served by X-windows, use the "Secure Keyboard" option from the xterm "main menu" usually invoked by the CTRL-<left mouse button>.  This featureis supposed to prevent X-windows clients authorized to connect to your server frombeing able to intercept your keystrokes into that xterm window.  The windowshould change color when this option is in effect.  You only need to protect keystrokeswhile you are entering the passphrase.  If you are concerned about yoursession data being snooped, you still need to ensure that other X clientscannot access your Xserver root and session windows.  Xwindows has other security holes such as unix-domain sockets in filesystem directories, frame buffer and keyboard device files..PPEven then, you must make sure that the terminal pty (/dev/ttyp*) associated with your xterm window is not subject to hijacking or eavesdropping.  You can find out thepty by using the .I tty(1) command.  Check the permissions and ownership of thatdevice file to ensure that it cannot be read by intruders on your local machine.  .PPThe same applies to the device special files for your screen frame buffer and keyboard interface..PP.I Desloginerases the memory storing your passphrase, and the resulting keys immediately after entry.  Only a hashed form of your session key remains buriedin the data segment of your .I deslogin process.  It is possible for a sufficiently determined attacker with root permission to your local machineto read the memory of your .I desloginprocess and compromise your session key.This won't help them determine your passphrase though..PPIn order to prevent idle traffic analysis by casual users, you should avoidspecifying any arguments to .I deslogin;just respond to the prompts instead..PPBeware of "trojan horses".  When you invoke .I deslogin,make sure that you aren't invoking another program in a directory in your PATH environment variable whichhas been placed there by a hostile user.  If you PATH includes directorieson remote machines, (especially including the current directory: '.'), be surethat the remote machines are trusted by you.  Invoking .I deslogin by its fullpath name on a local filessytem prevents this problem if the attackerhasn't replaced the original..PPIt is still possible that someone on the network between the two .I desloginhosts can attempt to record or insert data (possibly from a previoussession) into your encrypted data stream.  If this happens, you will seegarbage characters appear on your screen since the inserted data will be froma session using a different session key.I've used this program for several years and have never seen this happen, butit's possible.  .PPSummary: .I Desloginis designed to protect you fromunsecure networks traversed between your (secure) local host and a secure remote host.  It is best to use .I deslogin on a local machine which is not subject to a determined attack from hostile local users.  This is quite commonly a valid assumption; just be awarewhen you are making it.If you have reason tostrongly distrust root capable users on the local machine, do not use .I desloginto access a highly secure machine..SH AUTHENTICATION PROTOCOL.PP.I Desloginuses a "challenge-response" protocol to authenticate users.  Theremote host encrypts a 64-bit unique unpredictable nonce and sends it asthe "challenge"..I Desloginthen asks you for your passphrase which is hashed into a 56-bit DES authentication key used to decrypt the challenge and send back the 64-bit "response".  The remote host (which shares knowledge of your passphrase) decrypts the responseand compares the result with the nonce used to generate the challenge.  If they're equal, authentication succeeds and a unique session keyis generated by encrypting the challenge with your DES key.  Theauthentication key is immediately destroyed and the session key is then used to encrypt all other data transferred..SH ENVIRONMENT.PPSee the .I deslogin(1)manual page under the .I ENVIRONMENT section for useful environment variables such as .B TERMand .B RHOSTNAME..SH MISSING FEATURES.PPA more secure system would allow you to authenticate the identity of theremote host.  In practice this is not likely to be a serious problem sincesomeone attempting to "spoof" a remote host can only trick you into "signing" the authentication challenge packet by encrypting it with theDES key corresponding to your passphrase.  The conjecture is that DES hasproperties that make this computationally infeasible. Some disagree..PPSome method for the local netlogin to authenticate itself to you should bedevised to prevent trojan horses from masquerading as netlogin andtricking you into revealing your passphrase..PPThere needs to be a way for users to change their passphrases.  Currently,the administrator on the remote machine must set the passphrase.  Thiscould be construed as a "feature" since it allows the administrator toverify the passphrase difficult to guess..SH ACKNOWLEDGEMENTS.PPThe author has made every attempt to produce a secure and portable authenticated login program.  I havn't had time to integrate this with telnet and the myriads of telnet protocol extensions, which would have been the "right" way to implement this program.  Comments and improvementswill be greatly appreciated and should be directed to the author:.PPDavid A. Barrett (barrett@asgard.cs.Colorado.EDU).PPCopyright 1994 by David. A. Barrett..PPThis program is not to be distributed for profit or included in suchsoftware without written permission from the author.No permission is required for non-profit use..SH FILES.ta 1i/dev/tty	to output prompt and read passphrase .DT.SH SEE ALSOcipher(1),telnet(1),rlogin(1),deslogind(1),deslogingw(1),tty(1),getlogin(3)..\" index	\fIdeslogin\fR \- DES authenticated encrypted login \s-2DESLOGIN\s+1(1)\s+1.\".\" toc	\s-2DESLOGIN\s+1(1)\s+1:\0\0\fIdeslogin\fR 	 DES authenticated/encrypted login

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -