Subject: Re: sshd config?
To: None <tech-userlevel@NetBSD.org>
From: der Mouse <mouse@Rodents.Montreal.QC.CA>
List: tech-userlevel
Date: 11/29/2003 16:00:34
>> My [possibly flawed] understanding is that using 'none' causes
>> authentication to be insecure, not just encryption. So not only
>> might it compromise the current transaction, it could compromise
>> future transactions.
> While I do understand that "none" makes ssh unsecure, and may cause a
> misplaced sense of security, I prefer to have the option available.

Me too.  I'm perfectly content with requiring explicit reconfiguration
to make it available (such as Ciphers and MACs in sshd_config).  But I
think it is unreasonable to protect admins against themselves to the
extent of removing it entirely.

NetBSD tries to keep people from shooting themselves in the foot by
mistake.  But I think it is wrong to keep the guns locked away entirely
because people might shoot themselves in the foot.

> After all, even with null crypto, ssh is no worse than rlogin and
> friends (unless I am missing atrick here?).

As I read jhawk's message, it's saying that with "none" encryption, a
putative sniffer could acquire enough information to compromise your
private key, thereby rendering all sessions authenticated with that key
insecure.

I don't think this is true.  If it is, the protocol is grossly
misdesigned, because everything the sniffer gains, the peer server has
access to even with real encryption, and I think we will all agree that
the client should _never_ reveal to _anyone_ enough information to
compromise a private key.

/~\ The ASCII				der Mouse
\ / Ribbon Campaign
 X  Against HTML	       mouse@rodents.montreal.qc.ca
/ \ Email!	     7D C8 61 52 5D E7 2D 39  4E F1 31 3E E8 B3 27 4B