Public storage for public keys
Jason Stone
jason at shalott.net
Tue Jan 15 10:24:08 EST 2002
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
> > Yes, saved in a trusted location (ie, local file system).
> > A key in DNS is not trustworthy, since DNS is easily
> > compromised.
>
> Then the hard part - JH would have to play man-in-the-middle between A
> and B enough to convince A that the spoofed host key for B is okay...
> but how can JH do this without knowing the REAL private host key for
> system B? What am I missing?
No, JH doesn't have to know B's private key - that's the point. A doesn't
know B's public key ('cause this whole discussion is about how to give it
to him), so JH gets in the middle of A and B (check out dsniff, ettercap,
etc - this is real easy nowadays), and when A asks for B's public key, JH
hands his own public key to A. Now A encrypts all his packets with JH's
key and sends them to JH. JH then requests B's public key, decrypts all
of A's packets, re-encrypts them with B's public key, and passes them on
to B. Neither A nor B realizes, because at a fundamental level, they
don't _really_ know each other if they haven't already exchanged keys and
cached them locally.
Man-in-the-middle attacks are no longer strictly theoretical, nor reserved
for hardcore hackers. Easy and powerful tools are widely available to let
just anyone perform active attacks against a local net, even a switched
one, and shoddy key exchange is completely unacceptable.
You _could_ use DNSSEC to distribute the keys, and I'm interested in why
this ended up being rejected?
-Jason
-----------------------------------------------------------------------
I worry about my child and the Internet all the time, even though she's
too young to have logged on yet. Here's what I worry about. I worry
that 10 or 15 years from now, she will come to me and say "Daddy, where
were you when they took freedom of the press away from the Internet?"
-- Mike Godwin
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (FreeBSD)
Comment: See https://private.idealab.com/public/jason/jason.gpg
iD8DBQE8Q2icswXMWWtptckRAnDRAJ9RxSqC5tMlyC6/2PHAEZg9yL68SACcCF2K
DJd8KB7+Q1PFQP+BZgynM48=
=CKKQ
-----END PGP SIGNATURE-----
More information about the openssh-unix-dev
mailing list