Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 12 Nov 1999 14:55:17 -0500
From:      Niels Provos <provos@citi.umich.edu>
To:        Ollivier Robert <roberto@eurocontrol.fr>, freebsd-ports@freebsd.org
Cc:        markus@openbsd.org
Subject:   Re: Weird problem with OpenSSH 
Message-ID:  <199911121955.OAA18322@india.citi.umich.edu>
In-Reply-To: provos@openbsd.org, Fri, 12 Nov 1999 13:44:29 CST

next in thread | raw e-mail | index | archive | help
In message <199911121944.NAA28263@x40.deja.com>, provos@openbsd.org writes:
>debug: Remote protocol version 1.5, remote software version 1.2.26
>debug: Waiting for server public key.
>Warning: Server lies about size of server host key,
>Warning: this may be due to an old implementation of ssh.
>Warning: (actual size 1023 bits, announced size 1024 bits)
This means that the key on freefall has been generated with a buggy
version of ssh-keygen that pretended to create a 1024 bit key but only
created a 1023 bit one.  ssh-1.2.27 is lying about key sizes because
it never checks them, whereas OpenSSH does.

>debug: Received server public key (768 bits) and host key (1023 bits).
>@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
>@       WARNING: POSSIBLE DNS SPOOFING DETECTED!          @
>@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
>The host key for freefall.freebsd.org has changed,
>but the key for the according IP address 204.216.27.21 has
>a different status.  This could either mean that DNS
>SPOOFING is happening or the IP address for the host
>and its host key have changed at the same time
>@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
>@       WARNING: HOST IDENTIFICATION HAS CHANGED!         @
>@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
>IT IS POSSIBLE THAT SOMEONE IS DOING SOMETHING NASTY!
>Someone could be eavesdropping on you right now (man-in-the-middle attack)!
>It is also possible that the host key has just been changed.

OpenSSH now also records the IP address with the hostname in the
known_hosts file to check for example for DNS spoofing.

In your case I presume the following happened, the key for freefall
changed, and you used OpenSSH for the first time.  When OpenSSH receives
the public key from the server it notices:

1.  the key in known_hosts labeled freefall.freebsd.org is different
    from the one that I just received
2.  the IP address for that host has not entry in the known_hosts
    file that corresponds to the entry of freefall.freebsd.org,
    DNS spoofing might be happening.  This is also true if there
    is no entry for the IP address itself, which can happen when
    you didnt use OpenSSH before.

I hope this explanations helps a bit,
 Niels.


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-ports" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199911121955.OAA18322>