Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 9 Aug 2006 08:32:32 -0500
From:      Brooks Davis <brooks@one-eyed-alien.net>
To:        fwaggle <fwaggle@hungryhacker.com>
Cc:        freebsd-security@freebsd.org
Subject:   Re: seeding dev/random in 5.5
Message-ID:  <20060809133232.GC7832@lor.one-eyed-alien.net>
In-Reply-To: <44D9E348.3060604@hungryhacker.com>
References:  <44D922E0.5050005@FreeBSD.org> <20060809071735.71840.qmail@web30310.mail.mud.yahoo.com> <20060809130842.GA7832@lor.one-eyed-alien.net> <44D9E348.3060604@hungryhacker.com>

next in thread | previous in thread | raw e-mail | index | archive | help

[-- Attachment #1 --]
On Wed, Aug 09, 2006 at 09:29:44AM -0400, fwaggle wrote:
> Brooks Davis wrote:
> >On Wed, Aug 09, 2006 at 12:17:35AM -0700, R. B. Riddick wrote:
> >>--- Doug Barton <dougb@FreeBSD.org> wrote:
> [snip]
> >>* I received a private communication yesterday about this matter. But the 
> >>list
> >>did not. I will cite (not litterally) a little bit out of that message: 
> >>Since
> >>you do not know anything about the remotely created host-key, u cannot 
> >>connect
> >>safely to the freshly installed box, because: You do not even know the
> >>signature of the new host-key, so that if u connect to the wrong box u 
> >>would
> >>not even known. Workaround: You could give all hosts the same well-known
> >>host-key (via your install-image-CD) and then u could change the host-key 
> >>in a
> >>remotely controlled way individually and note down the signature? Maybe my
> >>secret informer (lets call him Rasmus or RK) wants to come public... :-)
> >
> >These are valid if probably overly paranoid points. :)
> [/snip]
> 
> i have a question. perhaps i'm misunderstanding something with how SSH 
> works, but how would having a "standard freebsd private key" benefit 
> anyone? if you wanted to impersonate a newly installed freebsd machine, 
> then all you'd need is that freely-available private key. plus you'd get 
> a bunch of clueless admins who had their machines installed by a 
> dedicated server provider, and who'd never change their host key, which 
> would effectively ruin SSH for their purposes.
> 
> unless i've seriously missed the boat somewhere (it's happened before!) 
> i think a better solution would still be random key generation with a 
> nice little option to email the key signature somewhere that the new 
> admin could pick it up. it's still fraught with impersonation danger for 
> the paranoid, but imo it's a better idea than having a not-so-private 
> key on install.

I interpreted the suggestion is something to be done via custom install
media.  There's no chance in hell the freebsd project would install a
default key since it's such an obviously bad idea.

-- Brooks

[-- Attachment #2 --]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2 (FreeBSD)

iD8DBQFE2ePvXY6L6fI4GtQRAn2xAJ48YiIC7YN4OuPvcDMZevqzm+7/EgCgq2Jl
nebczo980bTeAegcV4AYzIM=
=PrLI
-----END PGP SIGNATURE-----

Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20060809133232.GC7832>