IETF-SSH archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
Re: New Proposal for Section 11.1.4 Man-in-the-middle
On Thu, May 15, 2003 at 12:13:46PM -0600, Joseph Galbraith wrote:
> > However, this is conditional on the user being sure they really have
> > connected to the right server! I grant that an MITM seeing a
> > public-key authentication request wouldn't be able to use it to gain
> > access to the real server; but they could simply return Yes, and
> > _pretend_ to be the real server for as long as they could get away
> > with it in the absence of a genuine login there, in the hope that
> > the user might try to (for example) connect through to some other
> > system and type a password in. The user would have to verify the
> > connection by requesting some other piece of information from the
> > server which they already knew but which the MITM would be unlikely
> > to guess right.
>
> Right... this is what the origal claim was;
> man in the middle is not feasable with public
> key.
Yes, and I screwed up in my comment. What I meant to say was that
pubkey userauth with server host keys that are not securely distributed
is subject to spoofing - but I said instead that it's subject to MITM
attack. My apologies for the confusion.
> However, as you point out, a spoofing attack
> is-- which really makes this protection quite
> useless.
Right.
Nico
--
Home |
Main Index |
Thread Index |
Old Index