OpenSSH daemon security bug?

Michael Stone mstone at mathom.us
Wed Jan 6 06:18:03 EST 2010


On Tue, Jan 05, 2010 at 07:27:00PM +0100, you wrote:
>Password authentication with a weak password is in itself no more secure
>than public key authentication where the private key is protected with a
>weak password. In the former case the attacker only needs to guess the
>password, in the latter case they also need to get the private key.
>Knowledge of the public key does not help an attacker.

You can force the password complexity on the server side. You can't 
force the key management through technical means. That's a very 
important difference. Where this has proven to be a major headache in 
practice is when people have copies of their private keys scattered 
around on various machines, leading to intruders being able to jump from 
one machine to another. (Possibly from one organization to another, 
especially in collaborative environments like .edu's.) Private keys are 
seldom expired on a routine basis, so there may be forgotten copies 
lying about that haven't been used in years. (Should people do this? No.  
Does it happen? Yes. Can you prove none of your users have done it?  
Probably not.) Even with a strong password, there's a big difference 
between a passive offline attack against a key and an active brute force 
of a login password.

Mike Stone


More information about the openssh-unix-dev mailing list