Bugtraq mailing list archives

Re: SSH Protocol Trick


From: Markus Friedl <markus () openbsd org>
Date: Wed, 24 Jul 2002 23:44:14 +0200

SSH Protocol Weakness Advisory Monday, July 22 2002 - rtm

It's not really a protocol weakness, it's an annoyance caused by
the fact that there are multiple type of hostkeys, see the
discussion at
        http://marc.theaimsgroup.com/?t=101069210100016&r=1&w=4

Ssharp uses clever tricks to attack users by exploiting this
annoyance.  However, a MITM attack is always possible if the ssh
client prints:

        The authenticity of host 'jajajaja' can't be established.

The client in the next OpenSSH release will print out all known
keys for a host if a server (or MITM) sends an unknown host key
of a different type.

E.g. if you connect to a host with protocol v2 for the first
time, then the client warns you if you already have a key
for protocol v1, and so on.

That said, I'd like to repeat:

A MITM attack is always possible if the ssh client prints:

        The authenticity of host 'jajajaja' can't be established.

So better verify the key fingerprints.

Moreover, protocol version 2 with public key authentication allows
you to detect MITM attacks.


Current thread: