IETF-SSH archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
Re: An additional-auth mechanism for SSH to protect against scanning/probing attacks
On Fri, 6 Jan 2023, Peter Gutmann wrote:
> Damien Miller <djm%mindrot.org@localhost> writes:
>
> >fwiw OpenSSH handles lines from the server before the SSH-banner just fine:
>
> Ah, yeah, I saw OpenSSH as a server rather than client so never checked that
> one, but I would have expected it to get this bit right :-).
>
> >The SSH banner line is a bit special in that its contents are guaranteed to
> >be bound into the key exchange hash,
>
> Yup, that was a major reason for using it for that. Way too many IETF
> protocols in the past have ignored channel binding and either had to kludge it
> in afterwards or just left that aspect vulnerable, so having the non-SSH
> preauth cryptographically bound into the SSH protocol itself is a design
> feature.
But why? This is by definition before key exchange. The draft says:
> It should stop attackers at the gate, preventing probing past the first
> message exchanged.
This is before key exchange even beings, let alone yields an exchange hash
that is verified or taken in to use.
I don't see any reason why it can't use the already-specified pre-banner
messages.
-d
Home |
Main Index |
Thread Index |
Old Index