Re: [OT] ssh security

2010-03-10 Thread Erik Nørgaard
On Mar 10, 2010, at 11:59, Olivier Nicole wrote: Now Diffie-Hellman may help providing the trust for the fingerprint. No it won't. Trust goes either via a trusted third party as in PKI or the pgp chain of trust or via direct verification. In the latter case if you cannot establish tr

Re: [OT] ssh security

2010-03-10 Thread Olivier Nicole
Hi, > > The pre-shared information need not to be secret ... but there is > > need for pre-shared trusted information. > Er, if the pre-shared information is not secret, how can I be sure > that the person presenting it is in fact my intended correspondent > and not a MIM? That is why I wrote "tr

Re: [OT] ssh security

2010-03-09 Thread Erik Norgaard
On 10/03/10 07:16, per...@pluto.rain.com wrote: but logic tends to tell me that is I have no prior knowledge about the person I am about to talk to, anybody (MIM) could pretend to be that person. True. Cryptography by it self does not solve the identity problem. The pre-shared information ne

Re: [OT] ssh security

2010-03-09 Thread perryh
Olivier Nicole wrote: > > What happened to Diffie-Hellman? Last I heard, its whole > > point was to enable secure communication, protected from both > > eavesdropping and MIM attacks, between systems having no prior > > trust relationship (e.g. any sort of pre-shared secret) ... > > I am not expe

Re: [OT] ssh security

2010-03-09 Thread Liontaur
On Tue, Mar 9, 2010 at 12:48 AM, Olivier Nicole wrote: > > What happened to Diffie-Hellman? Last I heard, its whole point was > > to enable secure communication, protected from both eavesdropping > > and MIM attacks, between systems having no prior trust relationship > > (e.g. any sort of pre-sh

Re: [OT] ssh security

2010-03-09 Thread Olivier Nicole
> What happened to Diffie-Hellman? Last I heard, its whole point was > to enable secure communication, protected from both eavesdropping > and MIM attacks, between systems having no prior trust relationship > (e.g. any sort of pre-shared secret). What stops the server and > client from establishi

Re: [OT] ssh security

2010-03-09 Thread perryh
Angelin Lalev wrote: > So, SSH uses algorithms like ssh-dss or ssh-rsa to do key exchange. > These algorithms can defeat any attempts on eavesdropping, but cannot > defeat man-in-the-middle attacks. To defeat them, some pre-shared > information is needed - key fingerprint. What happened to Diffi

Re: [OT] ssh security

2010-03-08 Thread Noel Jones
On Sun, Mar 7, 2010 at 3:25 PM, Angelin Lalev wrote: > Greetings, > > I'm doing some research into ssh and its underlying cryptographic > methods and I have questions. I don't know whom else to ask and humbly > ask for forgiveness if I'm way OT. > > So, SSH uses algorithms like ssh-dss or ssh-rsa

Re: [OT] ssh security

2010-03-08 Thread Lowell Gilbert
Angelin Lalev writes: ;2~> On Sun, Mar 7, 2010 at 11:25 PM, Angelin Lalev wrote: >> Greetings, >> >> I'm doing some research into ssh and its underlying cryptographic >> methods and I have questions. I don't know whom else to ask and humbly >> ask for forgiveness if I'm way OT. >> >> So, SSH us

Re: [OT] ssh security

2010-03-07 Thread Angelin Lalev
On Sun, Mar 7, 2010 at 11:25 PM, Angelin Lalev wrote: > Greetings, > > I'm doing some research into ssh and its underlying cryptographic > methods and I have questions. I don't know whom else to ask and humbly > ask for forgiveness if I'm way OT. > > So, SSH uses algorithms like ssh-dss or ssh-rsa

[OT] ssh security

2010-03-07 Thread Angelin Lalev
Greetings, I'm doing some research into ssh and its underlying cryptographic methods and I have questions. I don't know whom else to ask and humbly ask for forgiveness if I'm way OT. So, SSH uses algorithms like ssh-dss or ssh-rsa to do key exchange. These algorithms can defeat any attempts on ea