[vox-tech] sshd_config and PasswordAuthentication

Karsten M. Self kmself at ix.netcom.com
Sun Jul 17 17:40:03 PDT 2005


on Sun, Jul 17, 2005 at 09:43:43AM -0500, Jay Strauss (me at heyjay.com) wrote:
> Karsten M. Self wrote:
> > on Thu, Jul 07, 2005 at 07:43:52AM -0700, Henry House 
> > (hajhouse at houseag.com) wrote:
> > 
> > > P? 2005-07-07, skrev Jay Strauss:
> > > 
> > > > Hi,
> > > > 
> > > > I have a sveasoft box, and in order to ssh from the sveasoft to
> > > > a target box, the target box must have PasswordAuthentication
> > > > yes in the /etc/ssh/sshd_config file.
> > > > 
> > > > I don't understand what that config option actually does.  The
> > > > config file has:
> > > > 
> > > > # To disable tunneled clear text passwords, change to no here!
> > > > 
> > > > Does this mean you can send clear text passwords to login?  Does
> > > > this mean that when you build a tunnel, passwords are sent clear
> > > > text to the forwarded app?
> 
> > 
> > The curious can read the SSH protocols here:
> > 
> >    http://www.snailbook.com/protocols.html
> > 
> > ...which I've done.  I've been using SSH for years, but only understand
> > some parts of it vaguely.
 
> Thanks Karsten.  It's a long email it's going to take me a bit to figure 
> out how this impacts me

Well, the *short* version is:

  - SSH (v2) *always* encrypts the channel between the two hosts
    participating in a session, prior to any user content being
    transmitted over that channel.  In SSH v1, it was possible to
    request an unencrypted channel, though default behavior was to
    encyrpt unless otherwise specified.

  - When using password authentication, your actual password *is*
    transmitted to the remote host.  If this remote host cannot be
    trusted (it's been compromised, it's a man-in-the-middle), then you
    _may_ find your password compromised.

  - "Man in the middle" refers to a class of cryptographic attack in
    which Eve (the evesdropper) situates herself between yourself
    (Carol) and the host you wish to communicate with (Bob).  If you
    cannot discriminate between Eve and Bob, you risk disclosure to Eve.

  - SSH-key authentication removes the possibility of leaking a password
    to Eve, by using a PKI key exchange in the authentication portion of
    session setup.  This also offers additional levels of control, as
    detailed in my earlier email.


So:

  - Your password is always (cryptographically) safe from evesdropping
    from outside the channel.

  - SSH-key auth removes a few vulnerabilities of password auth,
    introduces additional control points, and enables a number of
    convenience features (e.g.:  ssh-agent).


Mini-shrunk-sort version:  Use SSH-key auth with a passphrase and
ssh-agent.


Peace.

-- 
Karsten M. Self <kmself at ix.netcom.com>        http://kmself.home.netcom.com/
 What Part of "Gestalt" don't you understand?
    You know, maybe FSF should just rebrand emacs as the hurd and stick
    a fork() in it...
    - Karsten M. Self, on linux-elitists
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: Digital signature
Url : http://ns1.livepenguin.com/pipermail/vox-tech/attachments/20050717/88ec8d04/attachment.pgp


More information about the vox-tech mailing list