On 06/25/2012 19:13, Garrett Wollman wrote:
> <<On Mon, 25 Jun 2012 18:55:54 -0700, Doug Barton <do...@freebsd.org> said:
> 
>> Right. That's what Dag-Erling and I have been saying all along. If you
>> have the private host key you can impersonate the server. That's not a
>> MITM attack. That's impersonating the server.
> 
> If you can impersonate an ssh server, you can also do MitM, if the
> client isn't using an authentication mechanism that is securely tied
> to the ephemeral DH key protecting the session.  Not clear that this
> makes any difference in practice.

If you're impersonating the server you already have the traffic,
whatever else you can do for *that session* is an implementation detail.

For the zillionth time, my point is that being able to impersonate the
server is not going to get you anywhere for sessions *other* than the
ones that terminate at your fake-but-has-the-private-key host.

If anyone believes otherwise, please post how it can be done, in detail.
Otherwise please let this thread die.

Doug

-- 

    This .signature sanitized for your protection


_______________________________________________
freebsd-security@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-security
To unsubscribe, send any mail to "freebsd-security-unsubscr...@freebsd.org"

Reply via email to