IETF-SSH archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

Re: Terrapin



Mouse <mouse%Rodents-Montreal.ORG@localhost> writes:

> I'd recommend it; it's not all that long (16 pages, of which two are
> references and one is an appendix). 

I'll try to get time do to that reasonably soon.

> For this particular point, see
> section 5 of the paper; it begins (manually patched up for email)
>
> 	While the fact that BPP does not implement a secure channel is
> 	troublesome enough, exploiting this vulnerability requires an
> 	analysis of the SSH protocol at the application layer. 
[...]
> 	Historically, the first messages exchanged are
> 	SERVICE_REQUEST and SERVICE_ACCEPT.  Removing either causes the
> 	connection to go stale, as the client will not begin the user
> 	authentication protocol.  Then our attack, while
> 	cryptographically successful, fails at the application layer.

Technically, SERVICE_REQUEST and SERVICE_ACCEPT are *not* application
layer, they're clearly transport layer (defined in the transport layer
RFC, and with numbers in the transport layer "generic" range)... But I
find no hint in RFC 4253 that they may have cryptographic significance.

I'm not that familiar with EXT_INFO (never had a reason to implement it),
is there a good reason for the practice of squeezing those messages in
between NEWKEYS and the SERVICE messages? If everyone just stopped doing
that, that would go a long way to disabling this attack, it seems?

Regards,
/Niels

-- 
Niels Möller. PGP key CB4962D070D77D7FCB8BA36271D8F1FF368C6677.
Internet email is subject to wholesale government surveillance.



Home | Main Index | Thread Index | Old Index