Re: SSH Protocol Trick

From: Markus Friedl (markusat_private)
Date: Wed Jul 24 2002 - 14:44:14 PDT

  • Next message: Knud Erik Højgaard: "Re: Microsoft Security Bulletin MS02-032: 26 June 2002 Cumulative Patch for Windows Media Player (Q320920) (Version 2.0) (fwd)"

    > SSH Protocol Weakness Advisory Monday, July 22 2002 - rtm
    
    It's not really a protocol weakness, it's an annoyance caused by
    the fact that there are multiple type of hostkeys, see the
    discussion at
            http://marc.theaimsgroup.com/?t=101069210100016&r=1&w=4
    
    Ssharp uses clever tricks to attack users by exploiting this
    annoyance.  However, a MITM attack is always possible if the ssh
    client prints:
    
    	The authenticity of host 'jajajaja' can't be established.
    
    The client in the next OpenSSH release will print out all known
    keys for a host if a server (or MITM) sends an unknown host key
    of a different type.
    
    E.g. if you connect to a host with protocol v2 for the first
    time, then the client warns you if you already have a key
    for protocol v1, and so on.
    
    That said, I'd like to repeat:
    
    A MITM attack is always possible if the ssh client prints:
    
    	The authenticity of host 'jajajaja' can't be established.
    
    So better verify the key fingerprints.
    
    Moreover, protocol version 2 with public key authentication allows
    you to detect MITM attacks.
    



    This archive was generated by hypermail 2b30 : Thu Jul 25 2002 - 14:37:38 PDT