Re: Fixing exchange of host keys in the SSH key exchange

Peter Gutmann <pgut001@cs.auckland.ac.nz> Mon, 27 March 2017 05:55 UTC

Return-Path: <bounces-ietf-ssh-owner-secsh-tyoxbijeg7-archive=lists.ietf.org@NetBSD.org>
X-Original-To: ietfarch-secsh-tyoxbijeg7-archive@ietfa.amsl.com
Delivered-To: ietfarch-secsh-tyoxbijeg7-archive@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 64FA21293DA for <ietfarch-secsh-tyoxbijeg7-archive@ietfa.amsl.com>; Sun, 26 Mar 2017 22:55:11 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.2
X-Spam-Level:
X-Spam-Status: No, score=-4.2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HEADER_FROM_DIFFERENT_DOMAINS=0.001, RCVD_IN_DNSWL_MED=-2.3, RP_MATCHES_RCVD=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=auckland.ac.nz
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fSpSbC_yAr5T for <ietfarch-secsh-tyoxbijeg7-archive@ietfa.amsl.com>; Sun, 26 Mar 2017 22:55:10 -0700 (PDT)
Received: from mail.netbsd.org (mail.NetBSD.org [IPv6:2001:470:a085:999::25]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id F3076126C7A for <secsh-tyoxbijeg7-archive@lists.ietf.org>; Sun, 26 Mar 2017 22:55:09 -0700 (PDT)
Received: by mail.netbsd.org (Postfix, from userid 605) id 6AA7C855BA; Mon, 27 Mar 2017 05:55:09 +0000 (UTC)
Delivered-To: ietf-ssh@netbsd.org
Received: from localhost (localhost [127.0.0.1]) by mail.netbsd.org (Postfix) with ESMTP id 6E03C8559A for <ietf-ssh@netbsd.org>; Mon, 27 Mar 2017 05:55:07 +0000 (UTC)
X-Virus-Scanned: amavisd-new at netbsd.org
Authentication-Results: mail.netbsd.org (amavisd-new); dkim=pass (2048-bit key) header.d=auckland.ac.nz
Received: from mail.netbsd.org ([127.0.0.1]) by localhost (mail.netbsd.org [127.0.0.1]) (amavisd-new, port 10025) with ESMTP id SIQ1kkjXjDKH for <ietf-ssh@netbsd.org>; Mon, 27 Mar 2017 05:55:06 +0000 (UTC)
Received: from mx4.auckland.ac.nz (mx4.auckland.ac.nz [130.216.125.248]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.netbsd.org (Postfix) with ESMTPS id 62B1084CDA for <ietf-ssh@netbsd.org>; Mon, 27 Mar 2017 05:55:06 +0000 (UTC)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=auckland.ac.nz; i=@auckland.ac.nz; q=dns/txt; s=mail; t=1490594106; x=1522130106; h=from:to:subject:date:message-id:references:in-reply-to: content-transfer-encoding:mime-version; bh=gEOOPt1/uHpvsXFcq9j7T2YljlpYry+fH6e/RnNy97w=; b=g/1dnKjqJKVmgdagnb2PQhHYzK105I/wv0BoOJa+UXaH782/kh74JCkw MG0H+N56Zv8Og4VUSJUr5X42cvl8ZgaMmwHTK8AFkciDvSwa8Fi5otHPY o4dqUGxWuV63Z0GOuZllNabVVt8UgBjqFOIo0UDsVI36k0bF/aheoBYSv sx9lQF7QDepxbCEjNGBZ/sUKJgq/kwt3y3oPDB0/VZL1/jlXSQyBBXJfG 0bNLWmsQCIm9Tmu5otKzGA1UtCbIHNR4B/fEgSsjfbic5pKhK3NNgQ9/2 voI+rRg6uuLm/FCsRO9y31adyIb2vE/iAWAdxWqosse4U1Lk/JGAfzhDF w==;
X-IronPort-AV: E=Sophos;i="5.36,229,1486378800"; d="scan'208";a="145879177"
X-Ironport-HAT: MAIL-SERVERS - $RELAYED
X-Ironport-Source: 10.6.3.2 - Outgoing - Outgoing
Received: from smtp.uoa.auckland.ac.nz (HELO uxcn13-tdc-a.UoA.auckland.ac.nz) ([10.6.3.2]) by mx4-int.auckland.ac.nz with ESMTP/TLS/AES256-SHA; 27 Mar 2017 18:55:04 +1300
Received: from uxcn13-ogg-d.UoA.auckland.ac.nz (10.6.2.5) by uxcn13-tdc-a.UoA.auckland.ac.nz (10.6.3.2) with Microsoft SMTP Server (TLS) id 15.0.1263.5; Mon, 27 Mar 2017 18:55:04 +1300
Received: from uxcn13-ogg-d.UoA.auckland.ac.nz ([10.6.2.25]) by uxcn13-ogg-d.UoA.auckland.ac.nz ([10.6.2.25]) with mapi id 15.00.1263.000; Mon, 27 Mar 2017 18:55:04 +1300
From: Peter Gutmann <pgut001@cs.auckland.ac.nz>
To: Mouse <mouse@Rodents-Montreal.ORG>, "ietf-ssh@netbsd.org" <ietf-ssh@netbsd.org>
Subject: Re: Fixing exchange of host keys in the SSH key exchange
Thread-Topic: Fixing exchange of host keys in the SSH key exchange
Thread-Index: AQHSo6JCh/pnJs1+UUq8ewlt+ue/5qGjlx6QgAEOD4CAAi+kRYAAOraAgAAkIICAAQIltw==
Date: Mon, 27 Mar 2017 05:55:04 +0000
Message-ID: <1490594103881.5135@cs.auckland.ac.nz>
References: <2216143EDEE342A3A5C9BB786F7FEF7A@Khan><1490340148872.12344@cs.auckland.ac.nz>, <201703251227.IAA20189@Stone.Rodents-Montreal.ORG> <1490518384910.80699@cs.auckland.ac.nz> <AF94B953EDE7493782D80E299F0B24E2@Khan>, <201703270330.XAA28787@Stone.Rodents-Montreal.ORG>
In-Reply-To: <201703270330.XAA28787@Stone.Rodents-Montreal.ORG>
Accept-Language: en-NZ, en-GB, en-US
Content-Language: en-NZ
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [130.216.158.4]
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Sender: ietf-ssh-owner@NetBSD.org
List-Id: ietf-ssh.NetBSD.org
Precedence: list

Mouse <mouse@Rodents-Montreal.ORG> writes:

>It _does_ give the tools to those competent to use them; I think that's about
>all any such protocol can really expect to do.

It also warns about key changes so you can take action if necessary, which is
something that SSL doesn't.  Bank of America web site now hosted in the
Ukraine on a Windows 7 Home Premium box?  Let's see, it has a $5.99 GoDaddy
certificate.  Seems legit [0].

(I've only ever encountered one SSL-using app that warns that the key/cert
you're getting now differs from the one you got last time.  I'm sure there are
more out there, but none of the mainstream stuff does it).

Peter.

[O] I know, I like to bash PKI, but with farcical behaviour like this it's
    hard not to.