Fwd: Default password encryption method.

2012-06-25 Thread Aaron Zauner
so what about bcrypt? http://en.wikipedia.org/wiki/Bcrypt On Thu, Jun 21, 2012 at 7:38 PM, Aaron D. Gifford wrote: > On Tue, Jun 19, 2012 at 12:14 PM, Simon L. B. Nielsen > wrote: > ..snip... >> The FreeBSD Security Team is also looking at (/poking people to look at) >> solutions which will im

Re: Default password encryption method.

2012-06-25 Thread RW
On Mon, 25 Jun 2012 10:36:00 + Aaron Zauner wrote: > so what about bcrypt? > > http://en.wikipedia.org/wiki/Bcrypt We already have it, read the previous thread on the subject, it's only nine threads up. ___ freebsd-security@freebsd.org mailing li

RE: Hardware potential to duplicate existing host keys... RSA DSA ECDSA was Add rc.conf variables...

2012-06-25 Thread Dewayne Geraghty
> And as a flip side to the argument, is there a reason not to > raise the default to 4096? Certainly the same advances in > processors makes this size key quite usable. I've seen no > noticeable slowness with 4096 bit RSA or 521 bit ECDSA. Robert, A good question and it's good to check under

Re: Hardware potential to duplicate existing host keys... RSA DSA ECDSA was Add rc.conf variables...

2012-06-25 Thread J. Hellenthal
On Mon, Jun 25, 2012 at 02:31:04AM +0100, RW wrote: > On Sun, 24 Jun 2012 17:23:47 -0400 > Robert Simmons wrote: > > > On Sun, Jun 24, 2012 at 5:18 PM, Dag-Erling Smørgrav > > wrote: > > > Robert Simmons writes: > > >> In light of advanced in processors and GPUs, what is the potential > > >> f

Re: Hardware potential to duplicate existing host keys... RSA DSA ECDSA was Add rc.conf variables...

2012-06-25 Thread Dag-Erling Smørgrav
RW writes: > Dag-Erling Smørgrav writes: > > You do know that these keys are used only for authentication, and > > not for encryption, right? > I'm not very familiar with ssh, but surely they're also used for > session-key exchange, which makes them crucial to encryption. They > should be as secu

Re: Add rc.conf variables to control host key length

2012-06-25 Thread J. Hellenthal
On Sun, Jun 24, 2012 at 10:10:33PM -0400, Robert Simmons wrote: > On Sun, Jun 24, 2012 at 9:46 PM, Bjoern A. Zeeb > wrote: > > > > On 24. Jun 2012, at 17:14 , Robert Simmons wrote: > > > >> On Sun, Jun 24, 2012 at 12:34 PM, Bjoern A. Zeeb > >> wrote: > >>> On 24. Jun 2012, at 16:07 , Robert Simm

[PATCH] Make ssh-keyscan to fetch ECDSA keys by default

2012-06-25 Thread Xin Li
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Hi, Dag-Erling, Here is a patch from OpenBSD which makes ssh-keyscan to fetch ECDSA keys by default, to match the default hostkey algorithm. Cheers, - -- Xin LI https://www.delphij.net/ FreeBSD - The Power to Serve! Live free or die

Re: [PATCH] Make ssh-keyscan to fetch ECDSA keys by default

2012-06-25 Thread Dag-Erling Smørgrav
Xin Li writes: > Here is a patch from OpenBSD which makes ssh-keyscan to fetch ECDSA > keys by default, to match the default hostkey algorithm. Please commit to head with MFC after: 1 week. DES -- Dag-Erling Smørgrav - d...@des.no ___ freebsd-security

Re: [PATCH] Make ssh-keyscan to fetch ECDSA keys by default

2012-06-25 Thread Xin Li
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 The proposed change have been committed as r237567 (for vendor branch) and r237568 (merged to -HEAD with 1 week settle). Thanks! Cheers, - -- Xin LI https://www.delphij.net/ FreeBSD - The Power to Serve! Live free or die -BEGIN P

Re: [PATCH] Make ssh-keyscan to fetch ECDSA keys by default

2012-06-25 Thread Dag-Erling Smørgrav
Xin Li writes: > The proposed change have been committed as r237567 (for vendor branch) > and r237568 (merged to -HEAD with 1 week settle). Thanks! Looks great, thanks DES -- Dag-Erling Smørgrav - d...@des.no ___ freebsd-security@freebsd.org mailing

Re: Hardware potential to duplicate existing host keys... RSA DSA ECDSA was Add rc.conf variables...

2012-06-25 Thread RW
On Mon, 25 Jun 2012 18:09:14 +0200 Dag-Erling Smørgrav wrote: > RW writes: > > Dag-Erling Smørgrav writes: > > > You do know that these keys are used only for authentication, and > > > not for encryption, right? > > I'm not very familiar with ssh, but surely they're also used for > > session-key

Re: Hardware potential to duplicate existing host keys... RSA DSA ECDSA was Add rc.conf variables...

2012-06-25 Thread Doug Barton
On 06/25/2012 02:38 PM, RW wrote: > On Mon, 25 Jun 2012 18:09:14 +0200 > Dag-Erling Smørgrav wrote: > >> RW writes: >>> Dag-Erling Smørgrav writes: You do know that these keys are used only for authentication, and not for encryption, right? >>> I'm not very familiar with ssh, but surel

Re: Hardware potential to duplicate existing host keys... RSA DSA ECDSA was Add rc.conf variables...

2012-06-25 Thread RW
On Mon, 25 Jun 2012 14:59:05 -0700 Doug Barton wrote: > >> Having a copy of the host key allows you to do one thing and one > >> thing only: impersonate the server. It does not allow you to > >> eavesdrop on an already-established connection. > > > > It enables you to eavesdrop on new connection

Re: Hardware potential to duplicate existing host keys... RSA DSA ECDSA was Add rc.conf variables...

2012-06-25 Thread Doug Barton
On 06/25/2012 15:53, RW wrote: > On Mon, 25 Jun 2012 14:59:05 -0700 > Doug Barton wrote: > Having a copy of the host key allows you to do one thing and one thing only: impersonate the server. It does not allow you to eavesdrop on an already-established connection. >>> >>> It enable

Re: Hardware potential to duplicate existing host keys... RSA DSA ECDSA was Add rc.conf variables...

2012-06-25 Thread RW
On Mon, 25 Jun 2012 16:45:24 -0700 Doug Barton wrote: > On 06/25/2012 15:53, RW wrote: > > On Mon, 25 Jun 2012 14:59:05 -0700 > > Doug Barton wrote: > > > Having a copy of the host key allows you to do one thing and one > thing only: impersonate the server. It does not allow you to > >

Re: Hardware potential to duplicate existing host keys... RSA DSA ECDSA was Add rc.conf variables...

2012-06-25 Thread Doug Barton
On 06/25/2012 17:53, RW wrote: > On Mon, 25 Jun 2012 16:45:24 -0700 > Doug Barton wrote: > >> On 06/25/2012 15:53, RW wrote: >>> On Mon, 25 Jun 2012 14:59:05 -0700 >>> Doug Barton wrote: >>> >> Having a copy of the host key allows you to do one thing and one >> thing only: impersonate the

Re: Hardware potential to duplicate existing host keys... RSA DSA ECDSA was Add rc.conf variables...

2012-06-25 Thread RW
On Mon, 25 Jun 2012 17:58:50 -0700 Doug Barton wrote: > On 06/25/2012 17:53, RW wrote: > > On Mon, 25 Jun 2012 16:45:24 -0700 > > Doug Barton wrote: > > > >> On 06/25/2012 15:53, RW wrote: > >>> On Mon, 25 Jun 2012 14:59:05 -0700 > >>> Doug Barton wrote: > >>> > >> Having a copy of the host k

Re: Hardware potential to duplicate existing host keys... RSA DSA ECDSA was Add rc.conf variables...

2012-06-25 Thread Doug Barton
On 06/25/2012 18:46, RW wrote: > On Mon, 25 Jun 2012 17:58:50 -0700 > Doug Barton wrote: > >> On 06/25/2012 17:53, RW wrote: >>> On Mon, 25 Jun 2012 16:45:24 -0700 >>> Doug Barton wrote: >>> On 06/25/2012 15:53, RW wrote: > On Mon, 25 Jun 2012 14:59:05 -0700 > Doug Barton wrote: >

Re: Hardware potential to duplicate existing host keys... RSA DSA ECDSA was Add rc.conf variables...

2012-06-25 Thread Garrett Wollman
< said: > Right. That's what Dag-Erling and I have been saying all along. If you > have the private host key you can impersonate the server. That's not a > MITM attack. That's impersonating the server. If you can impersonate an ssh server, you can also do MitM, if the client isn't using an authen

Re: Hardware potential to duplicate existing host keys... RSA DSA ECDSA was Add rc.conf variables...

2012-06-25 Thread Doug Barton
On 06/25/2012 19:13, Garrett Wollman wrote: > < said: > >> Right. That's what Dag-Erling and I have been saying all along. If you >> have the private host key you can impersonate the server. That's not a >> MITM attack. That's impersonating the server. > > If you can impersonate an ssh server, yo

Re: Hardware potential to duplicate existing host keys... RSA DSA ECDSA was Add rc.conf variables...

2012-06-25 Thread RW
On Mon, 25 Jun 2012 18:55:54 -0700 Doug Barton wrote: > >> My point is that the ssh protocol is designed specifically to > >> prevent what you're describing. > > > > If you've obtained the server's private key by breaking the public > > key you can accept connections from clients just as if you

Re: Hardware potential to duplicate existing host keys... RSA DSA ECDSA was Add rc.conf variables...

2012-06-25 Thread RW
On Mon, 25 Jun 2012 19:20:35 -0700 Doug Barton wrote: > For the zillionth time, my point is that being able to impersonate the > server is not going to get you anywhere for sessions *other* than the > ones that terminate at your fake-but-has-the-private-key host. It's actually the first time tha

Re: Hardware potential to duplicate existing host keys... RSA DSA ECDSA was Add rc.conf variables...

2012-06-25 Thread J. Hellenthal
On Tue, Jun 26, 2012 at 03:56:09AM +0100, RW wrote: > On Mon, 25 Jun 2012 18:55:54 -0700 > Doug Barton wrote: > > > > >> My point is that the ssh protocol is designed specifically to > > >> prevent what you're describing. > > > > > > If you've obtained the server's private key by breaking the

Re: [PATCH] Make ssh-keyscan to fetch ECDSA keys by default

2012-06-25 Thread J. Hellenthal
Thanks Xin Li. sunpoet, I don't suppose you could port this into security/openssh-portable ? could you ? On Mon, Jun 25, 2012 at 12:07:04PM -0700, Xin Li wrote: > The proposed change have been committed as r237567 (for vendor branch) > and r237568 (merged to -HEAD with 1 week settle). Thanks!