zlacker

[parent] [thread] 4 comments
1. teduna+(OP)[view] [source] 2014-12-29 09:35:40
I don't think dmix was quite saying "go back to sleep." My concern is that "The NSA also has a program with which it claims it can sometimes decrypt the Secure Shell protocol (SSH)." (something I'm very much interested in) is in the very next paragraph. And still part of the "Hockey sites monitored" section (why??).

Do I take the ssh claim seriously? Do I just pretend the hockey monitoring paragraph isn't there?

Perhaps I should read the source for myself. http://www.spiegel.de/media/media-35515.pdf

Alas, there's very little in the way of detail. There's exactly one slide (19) dedicated to ssh, which says it can "potentially recover usernames and passwords." That would adequately describe a simple mitm attack where somebody either accepts an unknown server key or uses a client that doesn't even check (e.g. Prompt for iOS). Slides 35 and 36 mention ssh and decryption, but it sounds like they're talking about further processing after decryption. How is that decryption being done?

replies(2): >>acqq+g1 >>cpach+NF
2. acqq+g1[view] [source] 2014-12-29 10:01:16
>>teduna+(OP)
We have one real "case study":

https://firstlook.org/theintercept/2014/12/13/belgacom-hack-...

Active attacks allow access to the keys, and once the attackers have the keys, unless the PFS is properly used, the old captured streams are readable. But often it's even easier to read the documents on the attacked machine directly.

Still, all this was known before the material we comment now. Which doesn't mean we should let PFS remain unused or wrongly used as it is now and that we shouldn't try to protect us from the active attacks.

If we worry about the decryption of our SSH traffic, do we properly use PFS? What do we do to prevent or detect active attacks?

3. cpach+NF[view] [source] 2014-12-29 20:47:34
>>teduna+(OP)
Prompt doesn’t check the server’s key? That’s incredible. Do you have any sources on that?
replies(1): >>teduna+Kf1
◧◩
4. teduna+Kf1[view] [source] [discussion] 2014-12-30 09:37:01
>>cpach+NF
I used it. It never showed me the server key or asked to verify it.
replies(1): >>cpach+912
◧◩◪
5. cpach+912[view] [source] [discussion] 2014-12-30 21:31:03
>>teduna+Kf1
Wow. That’s really craptastic.
[go to top]