IETF-SSH archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
Re: x509
[ Ok, I'll better send my reply to the list as well. The message I'm
replying to first arrived only in my private mailbox. /Niels ]
Damien Miller <djm%mindrot.org@localhost> writes:
> On Thu, 2002-01-31 at 23:01, Niels Möller wrote:
>
> > But on second thought, this beautiful separation of SSH things from
> > x.509 things doesn't quite work. Somebody *has* to check that the e
> > and n above equals the key that is somewhere inside the ASN.1
> > certificate chain, otherwise, the certificate checking has a hole you
> > can drive a 20 ton truck right through.
>
> I think that is putting it a little strong - you still have to present a
> valid signature.
But that's trivial, in the scenario I'm thinking about. If I copy the
certificate chain that proves that your key is authorized, and then I
stuff in my own n and e values, together with a matching signature on
the session id, then (i) the x.509 certificate chain is perfectly ok,
and (ii) my signature matches the n and e, so I could get access. The
result is that the certification-check is completely by-passed.
> It seems unlikely that implementors would go to all the trouble of
> implementing certificate chain checking, etc only to miss something so
> basic.
I look at from the opposite direction. The trouble of implementing
certificate checking *must* include digging out the *certified* public
key from the certificate structures. Adding another *uncertified* copy
of the (hopefully same) key in the protocol is totally useless, and
only invites mistakes. The value of it is null and void, so just kill
it.
/Niels
Home |
Main Index |
Thread Index |
Old Index