Integrity protection of fetches

Till Maas opensource at till.name
Fri Aug 6 10:54:23 UTC 2010


On Fri, Aug 06, 2010 at 04:31:00AM -0500, Mike McGrath wrote:
> On Fri, 6 Aug 2010, Till Maas wrote:
> 
> > On Thu, Aug 05, 2010 at 04:32:36PM -0500, Mike McGrath wrote:
> > > On Thu, 5 Aug 2010, Till Maas wrote:
> >
> > > > Yes ssh is secure if used properly. To get the proper known_hosts entry,
> > > > one has to download https://admin.fedoraproject.org/ssh_known_hosts btw.
> > > >
> > >
> > > We also use SSHFP records for those of you that want to enable
> > > VerifyHostKeyDNS yes in their ~/.ssh/config files.  Not all of our hosts
> > > have it but many of our 'user' based external hosts do (pkgs,
> > > fedorapeople, fedorahosted, etc)
> >
> > Afaik the SSHFP records are not protected against tampering by an MITM
> > attacker.
> >
> 
> They're better then ssh alone.  They're only used for the first initation.
> So you'd have to be MITM'ed on the first connection in which case you're
> right, they wouldn't protect against that.

Afaik using the SSHFP records make SSH not warn the user that the host
key is not verified. If SSH would e.g. warn that the host key is
unknown, but at least matches the SSHFP record, then it might be a
little better. But actually it makes MITM attacks easier, because if one
tampers the DNS response and the SSH connection, then the user does not
even get a warning on the first attempt, making the situation even
worse IMHO.

And SSH is only vulnerable to MITM attacks on the first connection in
general and I guess that SSHFP records are not used anymore after the
first connection. What would they be good for when the host key is
already known to SSH?

Regards
Till
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 836 bytes
Desc: not available
Url : http://lists.fedoraproject.org/pipermail/devel/attachments/20100806/77adec11/attachment.bin 


More information about the devel mailing list