On Wed, Feb 27, 2002 at 12:14:21PM -0500, fred (Please remove 1st F from my email) 
wrote:
> 
> This sometimes presents a problem because
> the host I connect to is not always up.  All of a
> sudden I have to connect to different host at
> the far end, one for which I don't have the
> public key fingerprint.  I've telnetted into the
> host, but then thought better of querying the
> host for a public key fingerprint, since it would
> be displayed over an insecure channel.  It
> would totally defeat the purpose of confirming
> the host's public key fingerprint.

The fingerprint is simply a human readable hash of the SSH server's
public key.  There is nothing wrong with letting people see the
fingerprint.  You can put it on billboards, business cards, or web
pages.  The problem with sending it over a telnet session is that it
could be easily tampered with on its way to you.  Then you're just as
vulnerable to a man-in-the-middle attack as you would be by blindly
accepting the public key with no fingerprint verification.

However, if you are using telnet to get to the remote host in the first
place, then you are opening yourself up to worse problems.  Telnet is
about the least secure protocol on the planet.  Not only is the session
data sent in the clear, but so is the authentication data.  If you want
secure network connectivity then only use SSH and turn off telnet
completely.  As long as you are using telnet, then encrypting your VNC
sessions is probably pretty pointless.

> Is this getting overly paranoid?  How likely is
> it that someone would be waiting right there
> and right then to get the public key fingerprint
> just to pretend to be the far-end host the next
> time you connect?

There is a well known SSH man-in-the-middle exploit that is in common
use.  If security is a big enough concern for you to even be thinking
about this kind of attack, then you should do what you can to protect
yourself.  Keep a copy of fingerprints for every single host you might
ever connect to, or find some reliable means to access them remotely
(e.g. post them on a web page on an SSL encrypted server, or ask a
trusted person to read them to you over the telephone).  You don't need
to be concerned with keeping the public keys or fingerprints secret
(that's why they're called public), but you do need to be concerned with
their integrity.

> Would it be a reasonable
> risk to query the host for its public key fingerprint
> over an insecure telnet session, considering that
> you never have to repeat the query and thus
> never run the risk again?

The risk that someone will be ready and waiting to make a coordinated
attack which tampers with the fingerprint in your telnet session and
then intercepts the SSH connection is very low unless there is someone
you suspect would try it against you.  But after the attack succeeds
just once, every SSH session to that host is wide open from that point
until you change the host key (something people don't tend to do very
often).  Plus, once the attacker can sniff your unencrypted session,
other doors will probably open up.

Oops.  I just noticed that Illtud Daniel already offered a good
response.  Oh well, this stuff is worth repeating, I guess.  :-)

-- 
Mike Ossmann, Tarantella/UNIX Engineer/Instructor
Alternative Technology, Inc.  http://www.alttech.com/
---------------------------------------------------------------------
To unsubscribe, mail [EMAIL PROTECTED] with the line:
'unsubscribe vnc-list' in the message BODY
See also: http://www.uk.research.att.com/vnc/intouch.html
---------------------------------------------------------------------

Reply via email to