[18224] in bugtraq

home help back first fref pref prev next nref lref last post

"The End of SSL and SSH?"

daemon@ATHENA.MIT.EDU (Perry E. Metzger)
Wed Dec 20 16:37:02 2000

Message-Id:  <877l4w5lzq.fsf@snark.piermont.com>
Date:         Tue, 19 Dec 2000 13:01:13 -0500
Reply-To: "Perry E. Metzger" <perry@PIERMONT.COM>
From: "Perry E. Metzger" <perry@PIERMONT.COM>
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To:  Dug Song's message of "Mon, 18 Dec 2000 10:18:02 -0500"

Kurt Seifried in an article on SecurityPortal shrilly entitled "The
End of SSL and SSH?" claims that SSH needs a PKI to be secure.

The claim is that because people have built man-in-the-middle attack
software (see http://www.monkey.org/~dugsong/dsniff/) that can
intercept SSH sessions, that SSH is insecure. After all, if a MITM
attack happens, the user will be informed of this, and since the user
can choose to ignore the warning that a host key has changed and log
in, SSH must be fatally flawed. Without a PKI, Seifried claims, there
is no way to know if a host key is authentic.

This argument makes absolutely no sense to me.

The problem is simply one of the user interface allowing a user to
ignore a security failure. If a remote login utility using a PKI
prompted the user with "host key is not certified, log in anyway?", it
would be no better than SSH implementations. If A kerberized remote
login utility prompted a user with "remote key is incorrect, log in
anyway", it too would be no better.

If this is truly the extent of the flaw Mr. Seifried things requires a
full PKI to fix, I'd like to know why setting

StrictHostKeyChecking yes

isn't a near-complete fix to the "End of SSH" Mr. Seifried predicts.


Perry Metzger

home help back first fref pref prev next nref lref last post