IETF-SSH archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

Re: Question on transport protocol



On Tue, 15 Jan 2002, Derek Fawcus wrote:

> Or is the intention that if a non DH exchange is used,  then this delay
> is required (i.e in the more general case).

Exactly.  In your next post, you write:

> The obvious problem with implicit server authentication is that it
> leaves one open to a MITM attack...

This doesn't make sense, as a big objective of anything called "server
authentication" is exactly to *prevent* MITM.  Perhaps you have some model
of implicit authentication in mind, but the spec does not specify a
mechanism for "implicit server authentication."  The idea is merely that
it might happen as an integral part of some future key-exchange method,
which could then do without explicit server auth mechanism described here.
For examples, see the server auth method of SSH-1, as well as the
proprosed GSSAPI/Kerberos method for SSH-2.

-- 
  Richard Silverman
  slade%shore.net@localhost





Home | Main Index | Thread Index | Old Index