Re: improving ssh

2007-07-19 Thread Nicolas Williams
Doesn't this belong on the old SSHv2 WG's mailing list? On Sat, Jul 14, 2007 at 11:43:53AM -0700, Ed Gerck wrote: SSH (OpenSSH) is routinely used in secure access for remote server maintenance. However, as I see it, SSH has a number of security issues that have not been addressed (as far I

Re: improving ssh

2007-07-19 Thread Stanislaw Klekot
On Sat, Jul 14, 2007 at 11:43:53AM -0700, Ed Gerck wrote: SSH (OpenSSH) is routinely used in secure access for remote server maintenance. However, as I see it, SSH has a number of security issues that have not been addressed (as far I know), which create unnecessary vulnerabilities. Some

Re: improving ssh

2007-07-19 Thread Taral
On 7/14/07, Ed Gerck [EMAIL PROTECTED] wrote: 1. firewall port-knocking to block scanning and attacks I would love to see a mode like freenet's silent bob, where connectors must prove probable knowledge of the host key before the node will talk. 5. block sending host key fingerprint for

Re: improving ssh

2007-07-19 Thread Ivan Krstić
On Jul 14, 2007, at 2:43 PM, Ed Gerck wrote: 1. firewall port-knocking to block scanning and attacks 2. firewall logging and IP disabling for repeated attacks (prevent DoS, block dictionary attacks) 3. pre- and post-filtering to prevent SSH from advertising itself and server OS 4. block empty

Re: improving ssh

2007-07-19 Thread Ed Gerck
Ivan Krstić wrote: On Jul 14, 2007, at 2:43 PM, Ed Gerck wrote: 1. firewall port-knocking to block scanning and attacks 2. firewall logging and IP disabling for repeated attacks (prevent DoS, block dictionary attacks) 3. pre- and post-filtering to prevent SSH from advertising itself and

Re: improving ssh

2007-07-19 Thread Jun-ichiro itojun Hagino
i'm an OpenBSD developer, so i have some knowlege but could be biased. SSH (OpenSSH) is routinely used in secure access for remote server maintenance. However, as I see it, SSH has a number of security issues that have not been addressed (as far I know), which create unnecessary

Re: How the Greek cellphone network was tapped.

2007-07-19 Thread Peter Gutmann
Leichter, Jerry [EMAIL PROTECTED] writes: Between encrypted VOIP over WIFI and eventually over broadband cell - keeping people from running voice over their broadband connections is a battle the telco's can't win in the long run - and just plain encrypted cell phone calls, I think in a couple of

Re: How the Greek cellphone network was tapped.

2007-07-19 Thread Perry E. Metzger
[EMAIL PROTECTED] (Peter Gutmann) writes: I think you're looking at this a bit wrong. I rememeber the same opinion as the above being expressed on the brew-a-stu list about fifteen years ago, and no doubt some other list will carry it in another fifteen years time, with nothing else having

Re: How the Greek cellphone network was tapped.

2007-07-19 Thread Leichter, Jerry
| Between encrypted VOIP over WIFI and eventually over broadband cell - | keeping people from running voice over their broadband connections is | a battle the telco's can't win in the long run - and just plain | encrypted cell phone calls, I think in a couple of years anyone who | wants secure

Re: How the Greek cellphone network was tapped.

2007-07-19 Thread Bill Stewart
At 07:37 AM 7/12/2007, Eric Cronin wrote: With current CPUs and audio codecs you can get decent voice quality over 9600bps. Yes and no. There are lots of 8kbps codecs, and some 6.5 and 5.3kbps codecs, all off which give acceptable voice quality if transmission's ok. (And you can reduce

quantum random number generator ...

2007-07-19 Thread Michael Silk
hmm http://qrbg.irb.hr/ -- mike http://lets.coozi.com.au/ - The Cryptography Mailing List Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]

ADMIN: SSH discussion shut down

2007-07-19 Thread Perry E. Metzger
The SSH discussion has (in messages I didn't forward) rapidly degenerated into an argument that isn't very high signal. I'd suggest that the non-crypto aspects are best discussed on other mailing lists like the IETF SSH working group lists and the OpenSSH developers mailing list. If there are

Enigma for sale on eBay

2007-07-19 Thread Perry E. Metzger
http://cgi.ebay.com/ws/eBayISAPI.dll?ViewItemitem=270146164488 -- Perry E. Metzger[EMAIL PROTECTED] - The Cryptography Mailing List Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]

Re: improving ssh

2007-07-19 Thread Peter Gutmann
Ed Gerck [EMAIL PROTECTED] writes: Some issues could be minimized by turning off password authentication, which is not practical in many cases. That would probably make things much worse. A study of SSH attacks a few years ago showed that nearly two thirds of all SSH private keys were stored on

Re: How the Greek cellphone network was tapped.

2007-07-19 Thread Steven M. Bellovin
On Tue, 17 Jul 2007 13:11:41 -0400 (EDT) Leichter, Jerry [EMAIL PROTECTED] wrote: I'd guess that the next step will be in the business community. All it will take is one case where a deal is visibly lost because of proven eavesdropping (proven in quotes because it's unlikely that there

Re: New article on root certificate problems with Windows

2007-07-19 Thread pgut001
Paul Hoffman [EMAIL PROTECTED] writes: I posted a new security research article at http://www.proper.com/root-cert-problem/. It is not directly related to crypto (although not so much of the traffic on this list is...), it does relate to some PKI topics that are favorites of this list. The

Re: New article on root certificate problems with Windows

2007-07-19 Thread Paul Hoffman
At 2:45 AM +1200 7/20/07, [EMAIL PROTECTED] wrote: From a security point of view, this is really bad. From a usability point of view, it's necessary. As you can see from my list of proposed solutions, I disagree. I see no reason not to to alert a user *who has removed a root* that you are

Re: New article on root certificate problems with Windows

2007-07-19 Thread Ian G
[EMAIL PROTECTED] wrote: From a security point of view, this is really bad. From a usability point of view, it's necessary. I agree with all the above, including deleted. The solution is to let the HCI people into the design process, something that's very rarely, if ever, done in the

RE: How the Greek cellphone network was tapped.

2007-07-19 Thread Charles Jackson
An earlier post, talking about vulnerabilities and the lack of an appropriate market response, said: We're talking about phone calls -- did all of the well-publicized cellular eavesdropping (Prince Charles, Newt Gingrich (then a major US politician), and more) prompt a change? Well,

Yahoo + iPhone = replay attacks

2007-07-19 Thread Perry E. Metzger
A blog entry which claims that the proprietary Push IMAP protocol that Apple and Yahoo came up with is deeply flawed -- the entry states that the entire thing is vulnerable to trivial replay attacks. http://blog.dave.cridland.net/?p=32 Hat tip: Marshall Rose If true, this is yet more evidence

Re: New article on root certificate problems with Windows

2007-07-19 Thread Jeffrey Altman
[EMAIL PROTECTED] wrote: The executive summary, so I've got something to reply to: In the default configuration for Windows XP with Service Pack 2 (SP2), if a user removes one of the trusted root certificates, and the certifier who issued that root certificate is trusted by Microsoft,

summary, Re: improving ssh

2007-07-19 Thread Ed Gerck
List, Thanks everyone for the feedback. There are now some ideas how things could be improved using crypto. I prepared a summary of the public and private responses, and clarifications, at: http://email-security.blogspot.com/2007_07_01_archive.html Comments are welcome in here (if crypto) an