Date: Wed, 9 Aug 2006 08:32:32 -0500 From: Brooks Davis <brooks@one-eyed-alien.net> To: fwaggle <fwaggle@hungryhacker.com> Cc: freebsd-security@freebsd.org Subject: Re: seeding dev/random in 5.5 Message-ID: <20060809133232.GC7832@lor.one-eyed-alien.net> In-Reply-To: <44D9E348.3060604@hungryhacker.com> References: <44D922E0.5050005@FreeBSD.org> <20060809071735.71840.qmail@web30310.mail.mud.yahoo.com> <20060809130842.GA7832@lor.one-eyed-alien.net> <44D9E348.3060604@hungryhacker.com>
next in thread | previous in thread | raw e-mail | index | archive | help
--H8ygTp4AXg6deix2 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable On Wed, Aug 09, 2006 at 09:29:44AM -0400, fwaggle wrote: > Brooks Davis wrote: > >On Wed, Aug 09, 2006 at 12:17:35AM -0700, R. B. Riddick wrote: > >>--- Doug Barton <dougb@FreeBSD.org> wrote: > [snip] > >>* I received a private communication yesterday about this matter. But t= he=20 > >>list > >>did not. I will cite (not litterally) a little bit out of that message:= =20 > >>Since > >>you do not know anything about the remotely created host-key, u cannot= =20 > >>connect > >>safely to the freshly installed box, because: You do not even know the > >>signature of the new host-key, so that if u connect to the wrong box u= =20 > >>would > >>not even known. Workaround: You could give all hosts the same well-known > >>host-key (via your install-image-CD) and then u could change the host-k= ey=20 > >>in a > >>remotely controlled way individually and note down the signature? Maybe= my > >>secret informer (lets call him Rasmus or RK) wants to come public... :-) > > > >These are valid if probably overly paranoid points. :) > [/snip] >=20 > i have a question. perhaps i'm misunderstanding something with how SSH=20 > works, but how would having a "standard freebsd private key" benefit=20 > anyone? if you wanted to impersonate a newly installed freebsd machine,= =20 > then all you'd need is that freely-available private key. plus you'd get= =20 > a bunch of clueless admins who had their machines installed by a=20 > dedicated server provider, and who'd never change their host key, which= =20 > would effectively ruin SSH for their purposes. >=20 > unless i've seriously missed the boat somewhere (it's happened before!)= =20 > i think a better solution would still be random key generation with a=20 > nice little option to email the key signature somewhere that the new=20 > admin could pick it up. it's still fraught with impersonation danger for= =20 > the paranoid, but imo it's a better idea than having a not-so-private=20 > key on install. I interpreted the suggestion is something to be done via custom install media. There's no chance in hell the freebsd project would install a default key since it's such an obviously bad idea. -- Brooks --H8ygTp4AXg6deix2 Content-Type: application/pgp-signature Content-Disposition: inline -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.2 (FreeBSD) iD8DBQFE2ePvXY6L6fI4GtQRAn2xAJ48YiIC7YN4OuPvcDMZevqzm+7/EgCgq2Jl nebczo980bTeAegcV4AYzIM= =PrLI -----END PGP SIGNATURE----- --H8ygTp4AXg6deix2--
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20060809133232.GC7832>