Phil Pennock wrote:
> On 2009-03-02 at 18:36 -0800, Michael G Schwern wrote:
>> Tony Finch wrote:
>>> On Mon, 2 Mar 2009, Francisco Olarte Sanz wrote:
>>>> I think the point made by the original poster is valid, if you use a
>>>> encrypted unauthenticated connection you cannot just be sniffed, you
>>>> need to be subject to a MITM or similar attack.
>>> That's so difficult!
>> Yes, MITM is difficult.
> 
> Bull.  Go ahead and install dsniff, read the man-pages for the utilites
> that software provides.
> 
> You're spewing forth crap and are too ignorant to realise it.

Jesus christ, calm down.  It's the software we hate.  People are merely
targets for pity and loathing.

The sorts of things dsniff can do is easily defeated by an "am I talking to
the same ident as last time" system like ssh uses.  It only works if you A)
ignore the security warnings saying "HEY!  THIS ISN'T THE SAME GUY!" or B)
contact a self-signed host for the first time to which you then send sensitive
information.  If you ignore A, you're an idiot.  If you do B on an unsecured
network, you're also an idiot.

It also requires some crafting and social hacking on the part of the attacker.
 At minimum, they have to guess which web sites folks on the LAN are going to
connect to which will net them valuable information because you don't want to
just inject self-signed certs everywhere.  That would rapidly be noticed.

The scenario in the FAQ of "conference terminal rooms or webcafes as most
traveling SSH users don't carry their server's key fingerprint around with
them" is becoming less and less likely as more and more people carry laptops
or their own apps on a USB key.

It's also an active attack that can be noticed.  Either the network can
automatically watch for, or an alert user will notice there's an awful lot of
self-signed certs all of the sudden.  This makes it more likely you'll get
either shut down or worse, caught.

dsniff has made mitm a whole lot easier, but its still nothing compared to
opening up the big tcpdump sack, stuffing in all the in-the-clear packets you
can get for an hour and walking off with the booty.

Feel free to ignore the really important addendum of "compared to the ease of
sniffing unencrypted packets" and beat on the straw man of your choice.  The
original point was trying to solve encryption + identity is holding back
ubiquitous encryption.  Waving your arms around about OMG IT DOESN'T SOLVE
MITM is just that.

I want easy encryption everywhere with selective use of expensive identity
certification as necessary.  Security is a trade off between protection and
mobility.  Ask any tank designer, you put the heaviest armor where it's most
likely to get hit.


-- 
Insulting our readers is part of our business model.
        http://somethingpositive.net/sp07122005.shtml

Reply via email to