I managed to get time for some hacking this weekend.

News for the 0.9.10 release

        Fixed bug that caused buffered output to be lost at channel
        close.

        Experimental SRP support.

        New program srp-gen.
        
        Improved the hex dumps in debug output.

Some details on the SRP stuff is in
http://www.lysator.liu.se/~nisse/lsh/doc/srp-spec.nroff and
http://srp.stanford.edu.

Basically, you can create a password verifier and store it at
~/.lsh/srp-verifier, for instance by running

  srp-gen -o ~/.lsh/srp-verifier

If you remember the password, and both server and client are started
with --srp-keyexchange, you can log in in a reasonably secure way
using *only* the password, without knowing any host keys or
fingerprints.

The verifier should be kept secret; anyone who can read the verifier
can

  (i)  mount a dictionary attack on the SRP password
  (ii) impersonate the server, i.e. mount a MITM attack on all future
       connections that use SRP and and the same user and password.

 http://www.lysator.liu.se/~nisse/archive/lsh-0.9.10.tar.gz
 ftp://ftp.lysator.liu.se/pub/security/lsh/lsh-0.9.10.tar.gz

Happy hacking,
/Niels


Reply via email to