[vox-tech] sshd_config and PasswordAuthentication

Jay Strauss me at heyjay.com
Mon Jul 18 07:24:56 PDT 2005


Karsten M. Self wrote:
> on Sun, Jul 17, 2005 at 09:43:43AM -0500, Jay Strauss (me at heyjay.com) wrote:
> 
>>Karsten M. Self wrote:
>>
>>>on Thu, Jul 07, 2005 at 07:43:52AM -0700, Henry House 
>>>(hajhouse at houseag.com) wrote:
>>>
>>>
>>>>P? 2005-07-07, skrev Jay Strauss:
>>>>
>>>>
>>>>>Hi,
>>>>>
>>>>>I have a sveasoft box, and in order to ssh from the sveasoft to
>>>>>a target box, the target box must have PasswordAuthentication
>>>>>yes in the /etc/ssh/sshd_config file.
>>>>>
>>>>>I don't understand what that config option actually does.  The
>>>>>config file has:
>>>>>
>>>>># To disable tunneled clear text passwords, change to no here!
>>>>>
>>>>>Does this mean you can send clear text passwords to login?  Does
>>>>>this mean that when you build a tunnel, passwords are sent clear
>>>>>text to the forwarded app?
>>
>>>The curious can read the SSH protocols here:
>>>
>>>   http://www.snailbook.com/protocols.html
>>>
>>>...which I've done.  I've been using SSH for years, but only understand
>>>some parts of it vaguely.
> 
>  
> 
>>Thanks Karsten.  It's a long email it's going to take me a bit to figure 
>>out how this impacts me
> 
> 
> Well, the *short* version is:
> 
>   - SSH (v2) *always* encrypts the channel between the two hosts
>     participating in a session, prior to any user content being
>     transmitted over that channel.  In SSH v1, it was possible to
>     request an unencrypted channel, though default behavior was to
>     encyrpt unless otherwise specified.
> 
>   - When using password authentication, your actual password *is*
>     transmitted to the remote host.  If this remote host cannot be
>     trusted (it's been compromised, it's a man-in-the-middle), then you
>     _may_ find your password compromised.
> 
>   - "Man in the middle" refers to a class of cryptographic attack in
>     which Eve (the evesdropper) situates herself between yourself
>     (Carol) and the host you wish to communicate with (Bob).  If you
>     cannot discriminate between Eve and Bob, you risk disclosure to Eve.
> 
>   - SSH-key authentication removes the possibility of leaking a password
>     to Eve, by using a PKI key exchange in the authentication portion of
>     session setup.  This also offers additional levels of control, as
>     detailed in my earlier email.
> 
> 
> So:
> 
>   - Your password is always (cryptographically) safe from evesdropping
>     from outside the channel.
> 
>   - SSH-key auth removes a few vulnerabilities of password auth,
>     introduces additional control points, and enables a number of
>     convenience features (e.g.:  ssh-agent).
> 
> 
> Mini-shrunk-sort version:  Use SSH-key auth with a passphrase and
> ssh-agent.
> 
> 
> Peace.

thanks.  How do you NOT send the password?  Does Carol and Bob 
convert/encrypt their local password for this user, then compare the 
encryptions (maybe its call a hash in this context)?


Thanks
Jay


More information about the vox-tech mailing list