Re: [SECURITY] [DSA 1571-1] vulnerability of past SSH/SSL sessions

2008-05-15 Thread Kevin Buhr
Simon Valiquette <[EMAIL PROTECTED]> writes: > > It seems that people are insisting quite a lot on the bad keys, but > what worry me a lot more is that, apparently and very logically, past > ssh connections and any SSL session keys are to be considered > compromised. After hastily reviewing the

Re: [SECURITY] [DSA 1571-1] vulnerability of past SSH/SSL sessions

2008-05-14 Thread Simon Valiquette
Micah Anderson un jour écrivit: * Simon Valiquette <[EMAIL PROTECTED]> [2008-05-14 16:36-0400]: In other words, if a vulnerable key have been involved, and if someone was able to intercept and save the encrypted data, he/she can now decipher It, whether It is passwords, ssh sessions, secur

Re: [SECURITY] [DSA 1571-1] vulnerability of past SSH/SSL sessions

2008-05-14 Thread Henrique de Moraes Holschuh
On Wed, 14 May 2008, Micah Anderson wrote: > authenticity of the server. In other words, ssh sessions are not > compromised just because an adversary has the host keys (unless a MITM > is setup, in which case you need bot the host key and the authentication > key to perform a mitm attack). Ok. Bu

Re: [SECURITY] [DSA 1571-1] vulnerability of past SSH/SSL sessions

2008-05-14 Thread Micah Anderson
* Simon Valiquette <[EMAIL PROTECTED]> [2008-05-14 16:36-0400]: > >> Affected keys include SSH keys [...] and session keys used > > in SSL/TLS connections. > > It seems that people are insisting quite a lot on the bad keys, but > what worry me a lot more is that, apparently and very logically,

Re: [SECURITY] [DSA 1571-1] vulnerability of past SSH/SSL sessions

2008-05-14 Thread Simon Valiquette
Affected keys include SSH keys [...] and session keys used > in SSL/TLS connections. It seems that people are insisting quite a lot on the bad keys, but what worry me a lot more is that, apparently and very logically, past ssh connections and any SSL session keys are to be considered compr