Public storage for public keys
Frank Cusack
fcusack at fcusack.com
Tue Jan 15 10:03:21 EST 2002
On Mon, Jan 14, 2002 at 05:26:01PM -0500, Ed Phillips wrote:
> JH would have to first, intercept DNS traffic from A DNS and return a
> spoofed public host key for system B (okay - that should be easy enough
> for JH). Then the hard part - JH would have to play man-in-the-middle
> between A and B enough to convince A that the spoofed host key for B is
> okay... but how can JH do this without knowing the REAL private host key
> for system B? What am I missing?
The proposal is that the ssh client trusts the public key provided by
DNS. An attacker would send his own IP address and public key in a
spoofed (or poisoned) DNS reply.
/fc
More information about the openssh-unix-dev
mailing list