Re: [OT] ssh security

2010-03-10 Thread Olivier Nicole
Hi, The pre-shared information need not to be secret ... but there is need for pre-shared trusted information. Er, if the pre-shared information is not secret, how can I be sure that the person presenting it is in fact my intended correspondent and not a MIM? That is why I wrote trusted,

Re: [OT] ssh security

2010-03-10 Thread Erik Nørgaard
On Mar 10, 2010, at 11:59, Olivier Nicole olivier.nic...@cs.ait.ac.th wrote: Now Diffie-Hellman may help providing the trust for the fingerprint. No it won't. Trust goes either via a trusted third party as in PKI or the pgp chain of trust or via direct verification. In the latter case

Re: [OT] ssh security

2010-03-09 Thread perryh
Angelin Lalev lalev.ange...@gmail.com wrote: So, SSH uses algorithms like ssh-dss or ssh-rsa to do key exchange. These algorithms can defeat any attempts on eavesdropping, but cannot defeat man-in-the-middle attacks. To defeat them, some pre-shared information is needed - key fingerprint.

Re: [OT] ssh security

2010-03-09 Thread Olivier Nicole
What happened to Diffie-Hellman? Last I heard, its whole point was to enable secure communication, protected from both eavesdropping and MIM attacks, between systems having no prior trust relationship (e.g. any sort of pre-shared secret). What stops the server and client from establishing a

Re: [OT] ssh security

2010-03-09 Thread Liontaur
On Tue, Mar 9, 2010 at 12:48 AM, Olivier Nicole olivier.nic...@cs.ait.ac.th wrote: What happened to Diffie-Hellman? Last I heard, its whole point was to enable secure communication, protected from both eavesdropping and MIM attacks, between systems having no prior trust relationship

Re: [OT] ssh security

2010-03-09 Thread perryh
Olivier Nicole olivier.nic...@cs.ait.ac.th wrote: What happened to Diffie-Hellman? Last I heard, its whole point was to enable secure communication, protected from both eavesdropping and MIM attacks, between systems having no prior trust relationship (e.g. any sort of pre-shared secret)

Re: [OT] ssh security

2010-03-09 Thread Erik Norgaard
On 10/03/10 07:16, per...@pluto.rain.com wrote: but logic tends to tell me that is I have no prior knowledge about the person I am about to talk to, anybody (MIM) could pretend to be that person. True. Cryptography by it self does not solve the identity problem. The pre-shared information

Re: [OT] ssh security

2010-03-08 Thread Lowell Gilbert
Angelin Lalev lalev.ange...@gmail.com writes: ;2~ On Sun, Mar 7, 2010 at 11:25 PM, Angelin Lalev lalev.ange...@gmail.com wrote: Greetings, I'm doing some research into ssh and its underlying cryptographic methods and I have questions. I don't know whom else to ask and humbly ask for

Re: [OT] ssh security

2010-03-08 Thread Noel Jones
On Sun, Mar 7, 2010 at 3:25 PM, Angelin Lalev lalev.ange...@gmail.com wrote: Greetings, I'm doing some research into ssh and its underlying cryptographic methods and I have questions. I don't know whom else to ask and humbly ask for forgiveness if I'm way OT. So, SSH uses algorithms like

[OT] ssh security

2010-03-07 Thread Angelin Lalev
Greetings, I'm doing some research into ssh and its underlying cryptographic methods and I have questions. I don't know whom else to ask and humbly ask for forgiveness if I'm way OT. So, SSH uses algorithms like ssh-dss or ssh-rsa to do key exchange. These algorithms can defeat any attempts on

Re: [OT] ssh security

2010-03-07 Thread Angelin Lalev
On Sun, Mar 7, 2010 at 11:25 PM, Angelin Lalev lalev.ange...@gmail.com wrote: Greetings, I'm doing some research into ssh and its underlying cryptographic methods and I have questions. I don't know whom else to ask and humbly ask for forgiveness if I'm way OT. So, SSH uses algorithms like