Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 26 Jun 2012 03:56:09 +0100
From:      RW <rwmaillists@googlemail.com>
To:        freebsd-security@freebsd.org
Subject:   Re: Hardware potential to duplicate existing host keys... RSA DSA ECDSA was Add rc.conf variables...
Message-ID:  <20120626035609.0d0f061b@gumby.homeunix.com>
In-Reply-To: <4FE916AA.6050503@FreeBSD.org>
References:  <CA%2BQLa9A4gdgPEn3YBpExTG05e4mqbgxr2kJ16BQ27OSozVmmwQ@mail.gmail.com> <86zk7sxvc3.fsf@ds4.des.no> <CA%2BQLa9Dyu96AxmCNLcU8n5R21aTH6dStDT004iA516EH=jTkvQ@mail.gmail.com> <20120625023104.2a0c7627@gumby.homeunix.com> <86pq8nxtjp.fsf@ds4.des.no> <20120625223807.4dbeb91d@gumby.homeunix.com> <4FE8DF29.50406@FreeBSD.org> <20120625235310.3eed966e@gumby.homeunix.com> <4FE8F814.5020906@FreeBSD.org> <20120626015323.02b7f348@gumby.homeunix.com> <4FE9094A.4080605@FreeBSD.org> <20120626024624.4c333bd2@gumby.homeunix.com> <4FE916AA.6050503@FreeBSD.org>

next in thread | previous in thread | raw e-mail | index | archive | help
On Mon, 25 Jun 2012 18:55:54 -0700
Doug Barton wrote:


> >> My point is that the ssh protocol is designed specifically to
> >> prevent what you're describing.
> > 
> > If you've obtained the server's private key by breaking the public
> > key you can accept connections from clients just as if you are are
> > the real server.
> 
> Right. That's what Dag-Erling and I have been saying all along. If you
> have the private host key you can impersonate the server. That's not a
> MITM attack. That's impersonating the server.

If only the server is authenticated, then impersonating the
server is the only impediment to a MITM attack (aside from
intercepting the netwok traffic). If the server has client keys then
obviously it wont work.

> > If the server doesn't store client keys then there's
> > nothing to stop you establishing a separate connection with any
> > client side key and performing a MITM attack.
> 
> Last chance ... how, precisely, do you claim to be able to do this?

What's to stop you doing it where there's no authentication of clients?
All the attacker needs to do is establish an ssh connection to the
server and relay what he's getting from the original client. The
situation is analogous to performing a MITM attack against a website
where the ssl keys have been stolen by the attacker.  



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20120626035609.0d0f061b>