RW <rwmailli...@googlemail.com> writes:
> Dag-Erling Smørgrav <d...@des.no> writes:
> > [host keys] are used for authentication only.  This is crypto 101.
> It also generates a shared secret for key exchange, which is pretty
> much what I said.

No.  It is used to *sign* the key exhange, in order to authenticate the
server.  It is not used to *generate* the key.  You need to read up on
Diffie Hellman and the SSH transport layer (RFC 4253).  The only way to
intercept the key is a man-in-the-middle attack (negotiate a KEX with
the client, sign it with the stolen host key, and negotiate a KEX with
the server, pretending to be the client)

> > Having a copy of the host key allows you to do one thing and one thing
> > only: impersonate the server.  It does not allow you to eavesdrop on
> > an already-established connection.
> It enables you to eavesdrop on new connections, and  eavesdroppers
> are often in a position to force reconnection on old ones.

No.

DES
-- 
Dag-Erling Smørgrav - d...@des.no
_______________________________________________
freebsd-security@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-security
To unsubscribe, send any mail to "freebsd-security-unsubscr...@freebsd.org"

Reply via email to