ECDSA and first connection; bug?

Markus Friedl mfriedl at gmail.com
Fri Jan 28 09:03:43 EST 2011


yes, this is what Damien wrote.

Am 27.01.2011 um 17:38 schrieb Dan Kaminsky:

> What you'd want is a protocol to upgrade from an old host key to a new host key, leveraging the existing trust in the old key. 
> 
> Everything else is just a new leap of faith, including ssh-keyscan.
> 
> Sent from my iPhone
> 
> On Jan 27, 2011, at 5:20 AM, Markus Friedl <markus.r.friedl at arcor.de> wrote:
> 
>> I agree with Damien:
>> 
>> The current behaviour reduces the risks of a MITM attack and using
>> ssh-keyscan to collect the 'new' ECDSA is perfectly reasonable.
>> 
>> -m
>> 
>> On Tue, Jan 25, 2011 at 09:25:02AM +1100, Damien Miller wrote:
>>> On Mon, 24 Jan 2011, Phil Pennock wrote:
>>> 
>>>> Folks,
>>>> 
>>>> I read the 5.7 release announcement and updated, to try out ECDSA.  Most
>>>> parts worked very smoothly.  The inability to create SSHFP records is
>>>> understandable, since IANA haven't allocated a code yet.
>>>> 
>>>> One apparent bug: I think StrictHostKeyChecking=ask is broken for ECDSA.
>>>> 
>>>> % ssh -o HostKeyAlgorithms=ecdsa-sha2-nistp256 localhost
>>>> @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
>>>> @    WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED!     @
>>>> @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
>>> 
>>> This is deliberate. 
>>> 
>>> Previously, a malicious server could arrange for ssh(1) to display a
>>> less-scary message for a changed hostkey if its host key happened to
>>> be a different type to one that has already been learned.
>>> 
>>> Now there should be no surprises since ssh(1) will automatically request
>>> hostkey type matching keys that are already known, though this does not
>>> occur when you override HostkeyAlgorithms (like you did). We talked about
>>> whether we should retain the old message in this case or not, but thought
>>> the safest thing to do would be consistent with the non-explicit-
>>> HostkeyAlgorithms case.
>>> 
>>> For learning different hostkey types, we recommend ssh-keyscan. I'd like to
>>> do a protocol message for a server to send all its hostkeys to the client,
>>> but this would require a KEX extension and I'm not sure how compatible
>>> this would be with non-OpenSSH implementations.
>>> 
>>> -d
>>> 
>>> _______________________________________________
>>> openssh-unix-dev mailing list
>>> openssh-unix-dev at mindrot.org
>>> https://lists.mindrot.org/mailman/listinfo/openssh-unix-dev
>> _______________________________________________
>> openssh-unix-dev mailing list
>> openssh-unix-dev at mindrot.org
>> https://lists.mindrot.org/mailman/listinfo/openssh-unix-dev



More information about the openssh-unix-dev mailing list