Hardware potential to duplicate existing host keys... RSA DSA
ECDSA was Add rc.conf variables...
Dag-Erling Smørgrav
des at des.no
Tue Jun 26 11:01:13 UTC 2012
RW <rwmaillists at googlemail.com> writes:
> Dag-Erling Smørgrav <des at des.no> writes:
> > [host keys] are used for authentication only. This is crypto 101.
> It also generates a shared secret for key exchange, which is pretty
> much what I said.
No. It is used to *sign* the key exhange, in order to authenticate the
server. It is not used to *generate* the key. You need to read up on
Diffie Hellman and the SSH transport layer (RFC 4253). The only way to
intercept the key is a man-in-the-middle attack (negotiate a KEX with
the client, sign it with the stolen host key, and negotiate a KEX with
the server, pretending to be the client)
> > Having a copy of the host key allows you to do one thing and one thing
> > only: impersonate the server. It does not allow you to eavesdrop on
> > an already-established connection.
> It enables you to eavesdrop on new connections, and eavesdroppers
> are often in a position to force reconnection on old ones.
No.
DES
--
Dag-Erling Smørgrav - des at des.no
More information about the freebsd-security
mailing list