9fans - fans of the OS Plan 9 from Bell Labs
 help / color / mirror / Atom feed
* [9fans] SSH Version2
@ 2002-10-04 23:43 Adrian
  0 siblings, 0 replies; 16+ messages in thread
From: Adrian @ 2002-10-04 23:43 UTC (permalink / raw)
  To: 9fans

I`m having trouble connecting to a FreeBSD box
that only allows SSH2. Is this a config problem or is version 2
not currently supported ?

Adrian


^ permalink raw reply	[flat|nested] 16+ messages in thread
* Re: [9fans] SSH Version2
@ 2002-10-04 23:44 Russ Cox
  2002-10-07 10:42 ` Jeff Sickel
  0 siblings, 1 reply; 16+ messages in thread
From: Russ Cox @ 2002-10-04 23:44 UTC (permalink / raw)
  To: 9fans

our ssh client only does ssh1.




^ permalink raw reply	[flat|nested] 16+ messages in thread
* Re: [9fans] SSH Version2
@ 2002-10-07 16:21 Russ Cox
  2002-10-07 16:57 ` Andrew
  0 siblings, 1 reply; 16+ messages in thread
From: Russ Cox @ 2002-10-07 16:21 UTC (permalink / raw)
  To: 9fans

> ever heard of ettercap? the ultimate in script kiddie packet sniffing
> technology? it can break ssh1.
> http://ettercap.sourceforge.net/

that's not true.  it can stand in as a man-in-the-middle
for an active attack on ssh1.  that's only going to work
if you've never connected to the host before, or if you
ignore the man-in-the-middle warnings when the other end's
host key doesn't work out right.  to do that requires you
are proxy arping for the victim server, which limits the
attack even further.

from their readme:

5.4.4 SSH1 MAN-IN-THE-MIDDLE

 When the connection starts (remember that we are the master-of-packets, all
 packets go through ettercap) we substitute the server public key with one
 generated on the fly and save it in a list so we can remember that this
 server has been poisoned before.
 Then the client send the packet containing the session key ciphered with
 our key, so we are able to decipher it and sniff the real 3DES session key.
 Now we encrypt the packet with the correct server public key and forward it
 to the SSH daemon.
 The connection is established normally, but we have the session key !!
 Now we can decrypt all the traffic and sit down watching the stream !
 The connection will remain active even if we exit from ettercap, because
 ettercap doesn't proxy it (like dsniff). After the exchange of the keys,
 ettercap is only a spectator... ;)

russ


^ permalink raw reply	[flat|nested] 16+ messages in thread
* Re: [9fans] SSH Version2
@ 2002-10-07 16:31 Russ Cox
  0 siblings, 0 replies; 16+ messages in thread
From: Russ Cox @ 2002-10-07 16:31 UTC (permalink / raw)
  To: 9fans

I should add that it seems just as possible to do this in SSH2,
but since the protocol is significantly more complicated, the
ettercap guys just haven't gotten around to it.

Russ


^ permalink raw reply	[flat|nested] 16+ messages in thread
* Re: [9fans] SSH Version2
@ 2002-10-07 18:09 Eric Grosse
  2002-10-08  2:11 ` William K. Josephson
  0 siblings, 1 reply; 16+ messages in thread
From: Eric Grosse @ 2002-10-07 18:09 UTC (permalink / raw)
  To: 9fans

> yikes, does that mean Plan9 is subject to the ssh1 problems other systems are
> warned not to pursue (via switching to ssh2)?

We're not vulnerable to the integer overflow leading to root compromise, because
our implementation is independent and we happen not to have the same bugs.

But yes, we're vulnerable to the CRC/CBC attacks inherent in the protocol;  see
  http://www.kb.cert.org/vuls/id/13877
for details.  Unlike the integer overflow and man-in-the-middle attacks, this
one is not straightforward to launch.    Patches to other ssh implementations
have often introduced worse holes than the original problem, so we're inclined to
just switch to ssh2.  As further motivation, we mainly use ssh to call from Plan 9
to Unix systems and those will increasingly allow only ssh2.  But nobody here has
had time to do the work yet.

Any volunteers from outside?  We'd happily take back improved code and replace
what's in the distribution.

Also, if anyone following this more closely knows for a fact that tools for script
kiddies can routinely hijack existing sessions or break in to the idle server
under our implementation, please send mail and we'll rearrange our priorities.

Eric


^ permalink raw reply	[flat|nested] 16+ messages in thread
* Re: [9fans] SSH Version2
@ 2002-10-08  5:25 Russ Cox
  2002-10-08  6:16 ` Andrew
  0 siblings, 1 reply; 16+ messages in thread
From: Russ Cox @ 2002-10-08  5:25 UTC (permalink / raw)
  To: 9fans

> on the comment about ssh2, it was made more complicated specifically so
> it would be harder to break, and said theory has held true because as

NO NO NO.  It happened to be made more complicated.
Things that are more complicated are not necessarily harder
to break, and often easier to break.  Making it more
complicated was very likely not a design goal.

> you said yourself, the ettercap guys havent figured it out yet. i want it

Not true.  The ettercap guys haven't implemented it yet.
That's not the same as haven't figured it out yet.
The MITM attack remains the same.  They haven't implemented SSH2
support, just like we haven't.  This is very VERY different.

> to be difficult for someone to get my username and password, impossible
> is not an option yet, but one can certainly make it more difficult.

Impossible _is_ an option (modulo the attacker just happening to guess
the right password or key, which is unavoidable).

Also, don't use SSH in password mode.  Use it with public keys
or with challenge/response.  Not as good as PAK, but much better
than sending a password.

> network you trust (or are ignorant of). the idea behind ssh and all other
> tools like it, is so you can work on a network you dont entirely trust,
> if we always trusted networks we'd use telnet.

There's a difference between working on a network you don't entirely
trust and working on a network that is a complete unknown to you.
If you're that paranoid, just get the host keys via an out-of-band
mechanism, and you'll never have a problem.

I mean, come on.  What kind of paranoid are you if you ignore messages like:

@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
@    WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED!     @
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
IT IS POSSIBLE THAT SOMEONE IS DOING SOMETHING NASTY!
Someone could be eavesdropping on you right now (man-in-the-middle attack)!
It is also possible that the RSA1 host key has just been changed.
The fingerprint for the RSA1 key sent by the remote host is
2e:0e:82:ba:a3:d0:00:9a:ba:6d:87:e3:e0:b6:22:88.
Please contact your system administrator.
Add correct host key in /home/ny3/rsc/.ssh/known_hosts to get rid of this message.
Offending key in /home/ny3/rsc/.ssh/known_hosts:33
RSA1 host key for labrador.eecs.harvard.edu has changed and you have requested strict checking.
Host key verification failed.

Russ


^ permalink raw reply	[flat|nested] 16+ messages in thread

end of thread, other threads:[~2002-10-08  6:16 UTC | newest]

Thread overview: 16+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2002-10-04 23:43 [9fans] SSH Version2 Adrian
2002-10-04 23:44 Russ Cox
2002-10-07 10:42 ` Jeff Sickel
2002-10-07 12:51   ` Markus Friedl
2002-10-07 16:02     ` Andrew
2002-10-07 17:00       ` Markus Friedl
2002-10-07 16:21 Russ Cox
2002-10-07 16:57 ` Andrew
2002-10-08  2:16   ` William K. Josephson
2002-10-08  4:14     ` Andrew
2002-10-08  4:25       ` William Josephson
2002-10-07 16:31 Russ Cox
2002-10-07 18:09 Eric Grosse
2002-10-08  2:11 ` William K. Josephson
2002-10-08  5:25 Russ Cox
2002-10-08  6:16 ` Andrew

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).