On Wed, Apr 15, 2015 at 10:44:35AM +0100, Gervase Markham wrote:
> On 14/04/15 22:59, northrupthebandg...@gmail.com wrote:
> > The article assumes that when folks connect to something via SSH and
> > something changes - causing MITM-attack warnings and a refusal to
> > connect - folks default to just removing the existing entry in
> > ~/.ssh/known_hosts without actually questioning anything.
> 
> https://www.usenix.org/system/files/login/articles/105484-Gutmann.pdf

 That is somewhat discouraging, but I wonder what the conditions of
 these organizations are.  At the very risky end you could ignore a key
 change you were not told of ahead of time for <my chinese hosting
 provider>.  On the other hand if I'm sitting at my desk using my laptop
 and change the key for the sshd on my desktop there isn't nearly as
 much risk in ignoring the key my laptop sees.

> > "The first important thing to note about this model is that key
> > changes are an expected part of life."
> > 
> > Only if they've been communicated first. 
> 
> How does a website communicate with all its users that it is expecting
> to have (or has already had) a key change? After all, you can't exactly
> put a notice on the site itself...

Well, you can put up a notice while using the old cert, and in principal
you can sign the new cert with the old one similar to what you do when
changing gpg keys.  However in the case the old cert needs to be revoked
all users do need to go back to the out of band verification method.

> > "You can't provide [Joe Public] with a string of hex characters and
> > expect it to read it over the phone to his bank."
> > 
> > Sure you can.  Joe Public *already* has to do this with social
> > security numbers, credit card numbers, checking/savings account
> > numbers, etc. on a pretty routine basis, whether it's over the phone,
> > over the Internet, by mail, in person, or what have you.  What makes
> > an SSH fingerprint any different?  The fact that now you have the
> > letters A through F to read?  Please.
> 
> You have missed the question of motivation. I put up with reading a CC
> number over the phone (begrudgingly) because I know I need to do that in
> order to buy something. If I have a choice of clicking "OK" or phoning
> my bank, waiting in a queue, and eventually saying "Hi. I need to verify
> the key of your webserver's cert so I can log on to do my online
> banking. Is it 09F9.....?" then I'm just going to click "OK" (or
> "Whatever", as that button should be labelled).

I wonder if there's a reasonable way to make it hard to click "whatever",
but fairly easy to say
"I expect the finger print for the cert for foo.com is ab:cd:de:fg..."
if that's correct I'm happy this is secure.  As an asside I personally
find the manual comparison to be a pain even if I have both finger
prints easily available.

Trev


> 
> Gerv
> _______________________________________________
> dev-platform mailing list
> dev-platform@lists.mozilla.org
> https://lists.mozilla.org/listinfo/dev-platform
_______________________________________________
dev-platform mailing list
dev-platform@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-platform

Reply via email to