9fans - fans of the OS Plan 9 from Bell Labs
 help / color / mirror / Atom feed
* Re: [9fans] Re: The problem with SSH2
@ 2001-01-01 14:37 rob pike
  2001-01-01 15:18 ` Markus Friedl
  0 siblings, 1 reply; 20+ messages in thread
From: rob pike @ 2001-01-01 14:37 UTC (permalink / raw)
  To: 9fans

My disagreement with SSH is more specific.  It is a securitymonger's
plaything, so has been stuffed with every authentication and encryption
technology known, yet those that are configured when it is installed is
a random variable.  Therefore both sides must negotiate like crazy to figure
how to talk, and one often finds that there is no shared language. This is
idiocy.  The complexity is silly, but much worse is that there isn't at least
one guaranteed protocol for authentication and encryption that both
ends always have and can use as a fallback.  I would argue that that
would always be sufficient, but I know I'm in the minority there.  I do
argue that it's demonstrably necessary.

Algorithms everywhere, and not a byte to send.

-rob



^ permalink raw reply	[flat|nested] 20+ messages in thread

* Re: [9fans] Re: The problem with SSH2
  2001-01-01 14:37 [9fans] Re: The problem with SSH2 rob pike
@ 2001-01-01 15:18 ` Markus Friedl
  0 siblings, 0 replies; 20+ messages in thread
From: Markus Friedl @ 2001-01-01 15:18 UTC (permalink / raw)
  To: rob pike; +Cc: 9fans

On Mon, Jan 01, 2001 at 09:37:12AM -0500, rob pike wrote:
> The complexity is silly, but much worse is that there isn't at least
> one guaranteed protocol for authentication and encryption that both
> ends always have and can use as a fallback.  I would argue that that
> would always be sufficient, but I know I'm in the minority there.  I do
> argue that it's demonstrably necessary.

While I aggree that the SSH protocol is very complex, I think this
problem is more a policy issue than a protocol issue. E.g. the SSH2
protocol drafts require certain basic algorithms for authentication
and encryption.  This could be used as a fallback -- but only if
the server admin policy agrees to enable the methods.
But of course, if the protocol allows too many options it's probably
too hard for the server admin to decide which option is a good
or a bad thing.


^ permalink raw reply	[flat|nested] 20+ messages in thread

* Re: [9fans] Re: The problem with SSH2
  2001-01-26 20:46 ` Dan Cross
@ 2001-01-29 13:40   ` David Rubin
  0 siblings, 0 replies; 20+ messages in thread
From: David Rubin @ 2001-01-29 13:40 UTC (permalink / raw)
  To: 9fans

Dan Cross wrote:

> Well designed systems help those that know about them, but aren't even
> close to ubiquitous.

Ahh yes...Unix helps those who help themselves :-)

	david

-- 
FORTRAN was the language of choice for the same reason
that three-legged races are popular.
	-- Ken Thompson, "Reflections on Trusting Trust"


^ permalink raw reply	[flat|nested] 20+ messages in thread

* Re: [9fans] Re: The problem with SSH2
  2001-01-26 19:56 rsc
                   ` (2 preceding siblings ...)
  2001-01-27  1:01 ` Boyd Roberts
@ 2001-01-27 14:34 ` Markus Friedl
  3 siblings, 0 replies; 20+ messages in thread
From: Markus Friedl @ 2001-01-27 14:34 UTC (permalink / raw)
  To: 9fans

On Fri, Jan 26, 2001 at 02:56:40PM -0500, rsc@plan9.bell-labs.com wrote:
> no, but there's also nothing intrinsic to the
> task at hand that requires such a larded
> ad-hoc protocol.  cpu(1) does everything
> and more with just 9P and ssl.  while you
> might complain about ssl, the complexity
> of the ssh protocol is not in the layer-level
> encryption code.  it's everything else.
> you also might complain that 9P would be
> too slow, but i tried it and found that the
> small-packet latency was actually _less_
> using 9P than using native ssh on the same
> unix boxes for various networks.
> 
> we're stuck with ssh, but let's not delude
> ourselves into thinking it's a good protocol.
> 
> (i'm talking about ssh1; ssh2 looks worse.)

compared to SSH-1 the SSH-2 protocol is much simpler,
cleaner and layered -- and i don't think that the transport
layer of SSH-2 is more complex than SSL. only SSH-1 is a
larded ad-hoc protocol.

-m


^ permalink raw reply	[flat|nested] 20+ messages in thread

* Re: [9fans] Re: The problem with SSH2
  2001-01-27  2:34 rob pike
@ 2001-01-27  2:37 ` Boyd Roberts
  0 siblings, 0 replies; 20+ messages in thread
From: Boyd Roberts @ 2001-01-27  2:37 UTC (permalink / raw)
  To: 9fans

From: rob pike <rob@plan9.bell-labs.com>
> >  нет, а не то да?
>
> User is not a typewriter.
>

what ENOTTY?




^ permalink raw reply	[flat|nested] 20+ messages in thread

* Re: [9fans] Re: The problem with SSH2
@ 2001-01-27  2:34 rob pike
  2001-01-27  2:37 ` Boyd Roberts
  0 siblings, 1 reply; 20+ messages in thread
From: rob pike @ 2001-01-27  2:34 UTC (permalink / raw)
  To: 9fans


> Come on now Boyd, can't you just say
>  нет, а не то да?

User is not a typewriter.

-rob



^ permalink raw reply	[flat|nested] 20+ messages in thread

* Re: [9fans] Re: The problem with SSH2
  2001-01-27  2:13 dmr
@ 2001-01-27  2:30 ` Boyd Roberts
  0 siblings, 0 replies; 20+ messages in thread
From: Boyd Roberts @ 2001-01-27  2:30 UTC (permalink / raw)
  To: 9fans

> Come on now Boyd, can't you just say
>  нет, а не то да?
>
> -- Деннис
>

yer, a terror.  thanks to russ i got it installed.

it's complicated here.




^ permalink raw reply	[flat|nested] 20+ messages in thread

* Re: [9fans] Re: The problem with SSH2
@ 2001-01-27  2:13 dmr
  2001-01-27  2:30 ` Boyd Roberts
  0 siblings, 1 reply; 20+ messages in thread
From: dmr @ 2001-01-27  2:13 UTC (permalink / raw)
  To: 9fans

>> If I were Russian, I might say "niet".

> nyet, although it is written:

>    HET

Come on now Boyd, can't you just say
 нет, а не то да?

	 -- Деннис


^ permalink raw reply	[flat|nested] 20+ messages in thread

* Re: [9fans] Re: The problem with SSH2
@ 2001-01-27  1:04 presotto
  0 siblings, 0 replies; 20+ messages in thread
From: presotto @ 2001-01-27  1:04 UTC (permalink / raw)
  To: 9fans

[-- Attachment #1: Type: text/plain, Size: 59 bytes --]

I guess someone has to do it...

OK, you're a bonehead.

[-- Attachment #2: Type: message/rfc822, Size: 1803 bytes --]

From: "Boyd Roberts" <boyd@planete.net>
To: <9fans@cse.psu.edu>
Subject: Re: [9fans] Re: The problem with SSH2
Date: Sat, 27 Jan 2001 02:01:34 +0100
Message-ID: <005901c087fc$b1de0600$0ab9c6d4@cybercable.fr>

call me a bonehead, but security has to be simple,
so that you know exactly what it does.


^ permalink raw reply	[flat|nested] 20+ messages in thread

* Re: [9fans] Re: The problem with SSH2
  2001-01-26 19:56 rsc
  2001-01-26 20:46 ` Dan Cross
  2001-01-27  0:43 ` Boyd Roberts
@ 2001-01-27  1:01 ` Boyd Roberts
  2001-01-27 14:34 ` Markus Friedl
  3 siblings, 0 replies; 20+ messages in thread
From: Boyd Roberts @ 2001-01-27  1:01 UTC (permalink / raw)
  To: 9fans

call me a bonehead, but security has to be simple,
so that you know exactly what it does.




^ permalink raw reply	[flat|nested] 20+ messages in thread

* Re: [9fans] Re: The problem with SSH2
  2001-01-26 19:56 rsc
  2001-01-26 20:46 ` Dan Cross
@ 2001-01-27  0:43 ` Boyd Roberts
  2001-01-27  1:01 ` Boyd Roberts
  2001-01-27 14:34 ` Markus Friedl
  3 siblings, 0 replies; 20+ messages in thread
From: Boyd Roberts @ 2001-01-27  0:43 UTC (permalink / raw)
  To: 9fans

From: <rsc@plan9.bell-labs.com>
> it's everything else.
> you also might complain that 9P would be
> too slow, but i tried it and found that the
> small-packet latency was actually _less_
> using 9P than using native ssh on the same
> unix boxes for various networks.

surprise, surprise,  but you already knew that.




^ permalink raw reply	[flat|nested] 20+ messages in thread

* Re: [9fans] Re: The problem with SSH2
  2001-01-26 19:56 rsc
@ 2001-01-26 20:46 ` Dan Cross
  2001-01-29 13:40   ` David Rubin
  2001-01-27  0:43 ` Boyd Roberts
                   ` (2 subsequent siblings)
  3 siblings, 1 reply; 20+ messages in thread
From: Dan Cross @ 2001-01-26 20:46 UTC (permalink / raw)
  To: 9fans

In article <200101261956.OAA30860@smtp4.fas.harvard.edu> you write:
>we're stuck with ssh, but let's not delude
>ourselves into thinking it's a good protocol.

Indeed.

It's that whole ``role model'' thing.  It's hard for someone to design
a good protocol if they don't have good examples to work from.  Same
thing with implementing software.

Most efforts these days are predisposed to poor implementations because
that's the only world that the people doing the implementations know
about; people *have* deluded themselves into thinking that these things
are ``good.''  But look at where this stuff is coming from: Solaris,
Linux, and Windows.

Coincidence?  I think not.

Well designed systems help those that know about them, but aren't even
close to ubiquitous.  Couple that with rabid dogmatism about the
systems they *do* know about, and the situation is grim.

	- Dan C.



^ permalink raw reply	[flat|nested] 20+ messages in thread

* Re: [9fans] Re: The problem with SSH2
@ 2001-01-26 19:56 rsc
  2001-01-26 20:46 ` Dan Cross
                   ` (3 more replies)
  0 siblings, 4 replies; 20+ messages in thread
From: rsc @ 2001-01-26 19:56 UTC (permalink / raw)
  To: 9fans

	it may just be the instances you have seen. i've spend a bit of time
	with the draft documents; there is nothing intrinsic to its protocol
	that necessiates those larded implementations. 

no, but there's also nothing intrinsic to the
task at hand that requires such a larded
ad-hoc protocol.  cpu(1) does everything
and more with just 9P and ssl.  while you
might complain about ssl, the complexity
of the ssh protocol is not in the layer-level
encryption code.  it's everything else.
you also might complain that 9P would be
too slow, but i tried it and found that the
small-packet latency was actually _less_
using 9P than using native ssh on the same
unix boxes for various networks.

we're stuck with ssh, but let's not delude
ourselves into thinking it's a good protocol.

(i'm talking about ssh1; ssh2 looks worse.)

russ



^ permalink raw reply	[flat|nested] 20+ messages in thread

* Re: [9fans] Re: The problem with SSH2
  2001-01-01  7:38   ` Boyd Roberts
@ 2001-01-26 14:33     ` Ozan Yigit
  0 siblings, 0 replies; 20+ messages in thread
From: Ozan Yigit @ 2001-01-26 14:33 UTC (permalink / raw)
  To: 9fans

boyd@planete.net (Boyd Roberts) writes:

> real problem with SSH is that its too big and too complicated.

it may just be the instances you have seen. i've spend a bit of time
with the draft documents; there is nothing intrinsic to its protocol
that necessiates those larded implementations. [want a trip into the
twilight zone? take a look at lsh. keep a bucket nearby, as the trip
may be too hard on your stomach. :-/]

oz
-- 
www.cs.yorku.ca/~oz	 | if you couldn't find any weirdness, maybe
york u. computer science | we'll just have to make some!   -- hobbes


^ permalink raw reply	[flat|nested] 20+ messages in thread

* Re: [9fans] Re: The problem with SSH2
  2001-01-01 15:43 ` Boyd Roberts
  2001-01-02  8:27   ` Lyndon Nerenberg
@ 2001-01-02 17:49   ` cLIeNUX user
  1 sibling, 0 replies; 20+ messages in thread
From: cLIeNUX user @ 2001-01-02 17:49 UTC (permalink / raw)
  To: 9fans

boyd@planete.net... 
>From: rob pike <rob@plan9.bell-labs.com>
>
>> Yes, precisely. By making the thing too complicated, they defeat
>> the very purpose of security.  Difficult administration results in
>> incorrect or inadequate installation.  There are cases when I can't
>> use ssh, a direct consequence.
>
>hey, rob and i agree.  bloody miracle :-)

Worse.

THe ssh2 package organization isn't very inspiring either.

Rick Hohensee
Forth, unix, cLIeNUX, and worse.


^ permalink raw reply	[flat|nested] 20+ messages in thread

* Re: [9fans] Re: The problem with SSH2
  2001-01-01 15:43 ` Boyd Roberts
@ 2001-01-02  8:27   ` Lyndon Nerenberg
  2001-01-02 17:49   ` cLIeNUX user
  1 sibling, 0 replies; 20+ messages in thread
From: Lyndon Nerenberg @ 2001-01-02  8:27 UTC (permalink / raw)
  To: 9fans

> hey, rob and i agree.  bloody miracle :-)

A *sure* sign that we're firmly into the new millennium! ;-)

Happy New Year!

--lyndon




^ permalink raw reply	[flat|nested] 20+ messages in thread

* Re: [9fans] Re: The problem with SSH2
  2001-01-01 15:37 rob pike
@ 2001-01-01 15:43 ` Boyd Roberts
  2001-01-02  8:27   ` Lyndon Nerenberg
  2001-01-02 17:49   ` cLIeNUX user
  0 siblings, 2 replies; 20+ messages in thread
From: Boyd Roberts @ 2001-01-01 15:43 UTC (permalink / raw)
  To: 9fans

From: rob pike <rob@plan9.bell-labs.com>

> Yes, precisely. By making the thing too complicated, they defeat
> the very purpose of security.  Difficult administration results in
> incorrect or inadequate installation.  There are cases when I can't
> use ssh, a direct consequence.

hey, rob and i agree.  bloody miracle :-)




^ permalink raw reply	[flat|nested] 20+ messages in thread

* [9fans] Re: The problem with SSH2
@ 2001-01-01 15:37 rob pike
  2001-01-01 15:43 ` Boyd Roberts
  0 siblings, 1 reply; 20+ messages in thread
From: rob pike @ 2001-01-01 15:37 UTC (permalink / raw)
  To: 9fans

Yes, precisely. By making the thing too complicated, they defeat
the very purpose of security.  Difficult administration results in
incorrect or inadequate installation.  There are cases when I can't
use ssh, a direct consequence.

-rob



^ permalink raw reply	[flat|nested] 20+ messages in thread

* Re: [9fans] Re: The problem with SSH2
  2000-12-31 17:55 ` Jim Choate
@ 2001-01-01  7:38   ` Boyd Roberts
  2001-01-26 14:33     ` Ozan Yigit
  0 siblings, 1 reply; 20+ messages in thread
From: Boyd Roberts @ 2001-01-01  7:38 UTC (permalink / raw)
  To: 9fans, Markus Friedl; +Cc: cypherpunks, 9fans, hangar18

real problem with SSH is that its too big and too complicated.

you can't verify it or test it easily.




^ permalink raw reply	[flat|nested] 20+ messages in thread

* [9fans] Re: The problem with SSH2
       [not found] <20001231162642.A9783@folly>
@ 2000-12-31 17:55 ` Jim Choate
  2001-01-01  7:38   ` Boyd Roberts
  0 siblings, 1 reply; 20+ messages in thread
From: Jim Choate @ 2000-12-31 17:55 UTC (permalink / raw)
  To: Markus Friedl; +Cc: cypherpunks, 9fans, hangar18


On Sun, 31 Dec 2000, Markus Friedl wrote:

> On Fri, Dec 29, 2000 at 06:30:01PM +0000, Peter Fairbrother wrote:
> > Why not use a communication method that makes MITM attacks impossible to
> > successfully complete? Doesn't that "not expose them to risk at all"?
> 
> as Damien wrote: SSH2 + pk auth 'makes MITM attacks impossible to
> successfully complete'.

'pk auth' is handwaving.

How do you defeat the MITM attack against the key server this approach
requires? You don't, at some point there is a question of nothing but
'trust'. And it isn't testable. This is the fundamental weakness any any
security scheme that requires anything approaching public pk distribution.

The original point that what is needed is a distributed system with no
interest in message content is still valid. Then the parties using the
system can impliment the appropriate security for their purposes. Any
central server based system should be avoided. Any system that
pre-dictates the low-level format (ie non-delivery related) should be
avoided like the plague. Any system that requires single source (prefer
Open Source or PD) tools should be avoided like the black plague.

What we really need is a distributed network/process model (ala Plan 9)
that impliments content encryption at all levels, though 'next level' 
addressing should still be in the clear. Key management at the network
layer should be node-to-node (peer-to-peer) and left to the discression of
the individual parties. We accept that we need trust in our model and
distirbute it to the lowest level as well. This limits any breach of
security without massive amounts of resources, which limits the targets of
such attacks to reasonably readily identifiable, and as a result
protected, lists. Then using a distributed file system we can break the
actual contents up and store them 'holographically' (this probably means
multi-site storage for each little blob of a target file) so small amounts
of sites dropping off are irrelevant to the integrity of the file system.
At that point with some sort of 'anonymous thunking layer' (eg standard
anonymous remailer, posts through Usenet, or anonymous IP proxies) we can
impliment a 'data haven' sort of mechanism. This effectively means I can
access my 'home workspace' from anywhere on the Internet anonymously and
transparently (with respect to resource usage).

As an aside, this sort of architecture would also solve a lot of the
wireless issues as well.

    ____________________________________________________________________

           Before a larger group can see the virtue of an idea, a
           smaller group must first understand it.

                                           "Stranger Suns"
                                           George Zebrowski

       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage@ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------



^ permalink raw reply	[flat|nested] 20+ messages in thread

end of thread, other threads:[~2001-01-29 13:40 UTC | newest]

Thread overview: 20+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2001-01-01 14:37 [9fans] Re: The problem with SSH2 rob pike
2001-01-01 15:18 ` Markus Friedl
  -- strict thread matches above, loose matches on Subject: below --
2001-01-27  2:34 rob pike
2001-01-27  2:37 ` Boyd Roberts
2001-01-27  2:13 dmr
2001-01-27  2:30 ` Boyd Roberts
2001-01-27  1:04 presotto
2001-01-26 19:56 rsc
2001-01-26 20:46 ` Dan Cross
2001-01-29 13:40   ` David Rubin
2001-01-27  0:43 ` Boyd Roberts
2001-01-27  1:01 ` Boyd Roberts
2001-01-27 14:34 ` Markus Friedl
2001-01-01 15:37 rob pike
2001-01-01 15:43 ` Boyd Roberts
2001-01-02  8:27   ` Lyndon Nerenberg
2001-01-02 17:49   ` cLIeNUX user
     [not found] <20001231162642.A9783@folly>
2000-12-31 17:55 ` Jim Choate
2001-01-01  7:38   ` Boyd Roberts
2001-01-26 14:33     ` Ozan Yigit

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).