Date: Wed, 9 Aug 2006 08:32:32 -0500 From: Brooks Davis <brooks@one-eyed-alien.net> To: fwaggle <fwaggle@hungryhacker.com> Cc: freebsd-security@freebsd.org Subject: Re: seeding dev/random in 5.5 Message-ID: <20060809133232.GC7832@lor.one-eyed-alien.net> In-Reply-To: <44D9E348.3060604@hungryhacker.com> References: <44D922E0.5050005@FreeBSD.org> <20060809071735.71840.qmail@web30310.mail.mud.yahoo.com> <20060809130842.GA7832@lor.one-eyed-alien.net> <44D9E348.3060604@hungryhacker.com>
next in thread | previous in thread | raw e-mail | index | archive | help
[-- Attachment #1 --] On Wed, Aug 09, 2006 at 09:29:44AM -0400, fwaggle wrote: > Brooks Davis wrote: > >On Wed, Aug 09, 2006 at 12:17:35AM -0700, R. B. Riddick wrote: > >>--- Doug Barton <dougb@FreeBSD.org> wrote: > [snip] > >>* I received a private communication yesterday about this matter. But the > >>list > >>did not. I will cite (not litterally) a little bit out of that message: > >>Since > >>you do not know anything about the remotely created host-key, u cannot > >>connect > >>safely to the freshly installed box, because: You do not even know the > >>signature of the new host-key, so that if u connect to the wrong box u > >>would > >>not even known. Workaround: You could give all hosts the same well-known > >>host-key (via your install-image-CD) and then u could change the host-key > >>in a > >>remotely controlled way individually and note down the signature? Maybe my > >>secret informer (lets call him Rasmus or RK) wants to come public... :-) > > > >These are valid if probably overly paranoid points. :) > [/snip] > > i have a question. perhaps i'm misunderstanding something with how SSH > works, but how would having a "standard freebsd private key" benefit > anyone? if you wanted to impersonate a newly installed freebsd machine, > then all you'd need is that freely-available private key. plus you'd get > a bunch of clueless admins who had their machines installed by a > dedicated server provider, and who'd never change their host key, which > would effectively ruin SSH for their purposes. > > unless i've seriously missed the boat somewhere (it's happened before!) > i think a better solution would still be random key generation with a > nice little option to email the key signature somewhere that the new > admin could pick it up. it's still fraught with impersonation danger for > the paranoid, but imo it's a better idea than having a not-so-private > key on install. I interpreted the suggestion is something to be done via custom install media. There's no chance in hell the freebsd project would install a default key since it's such an obviously bad idea. -- Brooks [-- Attachment #2 --] -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.2 (FreeBSD) iD8DBQFE2ePvXY6L6fI4GtQRAn2xAJ48YiIC7YN4OuPvcDMZevqzm+7/EgCgq2Jl nebczo980bTeAegcV4AYzIM= =PrLI -----END PGP SIGNATURE-----
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20060809133232.GC7832>
