[5225] in testers

home help back first fref pref prev next nref lref last post

Re: sshd uses wrong replay cache for version 1

daemon@ATHENA.MIT.EDU (Sam Hartman)
Tue Jun 11 22:34:50 2002

To: John Hawkinson <jhawk@mit.edu>
Cc: testers@mit.edu
From: Sam Hartman <hartmans@MIT.EDU>
Date: Tue, 11 Jun 2002 22:34:38 -0400
In-Reply-To: <20020611220311.GB21753@multics.mit.edu> (John Hawkinson's
 message of "Tue, 11 Jun 2002 18:03:11 -0400")
Message-ID: <87adq1tebl.fsf@luminous.mit.edu>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii

>>>>> "John" == John Hawkinson <jhawk@MIT.EDU> writes:

    John> Sam Hartman <hartmans@MIT.EDU> wrote on Tue, 11 Jun 2002 at
    John> 13:19:50 -0400 in
    John> <20020611171950.814D4151FEF@industrial-algebra.mit.edu>:


    >>  At first I thought this could be exploited on systems with
    >> unencrypted rlogin enabled in order to gain rlogin access by
    >> sniffing the authenticators sent over the ssh session.
    >> However, it turns out that since the Kerberos exchange is
    >> encrypted within the ssh session for version 1, I cannot think
    >> of a way to exploit this.

    John> Isn't the kerberos exchange only encrypted for one of
    John> {openssh | ssh.com}?

You're thinking of krb5_cred.  The credentials should be
double-encrypted once in the ssh session layer and once at the
Kerberos layer.  With ssh.com they are only encrypted at the ssh
session layer.


home help back first fref pref prev next nref lref last post