On 24.07.2013 09:11, Jakob Unterwurzacher wrote:
> With RSA, the sessions should be protected using a random per-session
>  key exchanged using diffie-hellmann that does not depend on the
> private key for its security.
>
> I will try to find a definitive source for that and follow-up here.

Found it. The buzzword is "perfect forward secrecy" (PFS), and SSH - 
both version 1 and 2 - have it.

It's explained very nicely in [1] and [2], but for
the definitive source I'm just gonna quote the sshd_config manpage:

> KeyRegenerationInterval
> In protocol version 1, the ephemeral server
> key is automatically regenerated after this many seconds (if it has
> been used). The purpose of regeneration is to prevent decrypting
> captured sessions by later breaking into the machine and stealing the
> keys. The key is never stored anywhere.

SSHv2 does it differently but achieves the same goal.


Conclusion:
SSH to thin clients is secure against passive eavesdropping, even if the 
host key is shared.
However, do NOT use a password to log into the thin client, this is 
insecure!


Alkis, I'd suggest to not delete the host key, instead to make sure that 
passwords are not allowed in sshd_config, i.e.

PasswordAuthentication no


Best regards,
Jakob


References:
[1] http://utcc.utoronto.ca/~cks/space/blog/tech/SshForwardSecrecy
[2] http://docstore.mik.ua/orelly/networking_2ndEd/ssh/ch03_05.htm

------------------------------------------------------------------------------
See everything from the browser to the database with AppDynamics
Get end-to-end visibility with application monitoring from AppDynamics
Isolate bottlenecks and diagnose root cause in seconds.
Start your free trial of AppDynamics Pro today!
http://pubads.g.doubleclick.net/gampad/clk?id=48808831&iu=/4140/ostg.clktrk
_____________________________________________________________________
Ltsp-discuss mailing list.   To un-subscribe, or change prefs, goto:
      https://lists.sourceforge.net/lists/listinfo/ltsp-discuss
For additional LTSP help,   try #ltsp channel on irc.freenode.net

Reply via email to