[OT] ssh security
Lowell Gilbert
freebsd-questions-local at be-well.ilk.org
Mon Mar 8 19:19:43 UTC 2010
Angelin Lalev <lalev.angelin at gmail.com> writes:
;2~> On Sun, Mar 7, 2010 at 11:25 PM, Angelin Lalev <lalev.angelin at gmail.com> wrote:
>> Greetings,
>>
>> I'm doing some research into ssh and its underlying cryptographic
>> methods and I have questions. I don't know whom else to ask and humbly
>> ask for forgiveness if I'm way OT.
>>
>> So, SSH uses algorithms like ssh-dss or ssh-rsa to do key exchange.
>> These algorithms can defeat any attempts on eavesdropping, but cannot
>> defeat man-in-the-middle attacks. To defeat them, some pre-shared
>> information is needed - key fingerprint.
>>
>> If hypothetically someone uses instead of the plain text
>> authentication some challenge-response scheme, based on user's
>> password or even a hash of user's password would ssh be able to avoid
>> the need the user to have key fingerprints of the server prior the
>> first connection?
>>
>
> To clarify, we as users anyway do have shared secret with the server
> and that's the authentication password why we could not use that
> instead of or in addition to a key fingerprint?
Because we don't want to give an attacker access to a shared secret if
we can verify host identity with a public key first.
--
Lowell Gilbert, embedded/networking software engineer, Boston area
http://be-well.ilk.org/~lowell/
More information about the freebsd-questions
mailing list