Hardware potential to duplicate existing host keys... RSA DSA ECDSA was Add rc.conf variables...

Dag-Erling Smørgrav des at des.no
Tue Jun 26 11:01:13 UTC 2012


RW <rwmaillists at googlemail.com> writes:
> Dag-Erling Smørgrav <des at des.no> writes:
> > [host keys] are used for authentication only.  This is crypto 101.
> It also generates a shared secret for key exchange, which is pretty
> much what I said.

No.  It is used to *sign* the key exhange, in order to authenticate the
server.  It is not used to *generate* the key.  You need to read up on
Diffie Hellman and the SSH transport layer (RFC 4253).  The only way to
intercept the key is a man-in-the-middle attack (negotiate a KEX with
the client, sign it with the stolen host key, and negotiate a KEX with
the server, pretending to be the client)

> > Having a copy of the host key allows you to do one thing and one thing
> > only: impersonate the server.  It does not allow you to eavesdrop on
> > an already-established connection.
> It enables you to eavesdrop on new connections, and  eavesdroppers
> are often in a position to force reconnection on old ones.

No.

DES
-- 
Dag-Erling Smørgrav - des at des.no


More information about the freebsd-security mailing list