security
Alaric Dailey
alaricdailey at hotmail.com
Tue Oct 24 11:41:45 UTC 2006
To prevent a MITM attack when using SSH, you have to validate the key
fingerprint manually. Doing this properly is a much larger PITA than using
a trusted introducer, such as when you use PayPal or Amazon. Most people
have no idea that you have to check fingerprints manually and out-of-band in
order to trust encryption systems without a trusted introducer, such systems
included, OTR ( http://www.cypherpunks.ca/otr ), PGP/GPG (
http://www.pgp.com and http://www.gnupg.org respectively ), SSH, and all
self-signed SSL certificates.
I still wouldn't call SSL a PITA though. These days its cheap (
http://www.registerfly.com/ssl/ ) or free ( http://cert.startcom.org ) and
much easier than trying to teach your users how to validate a key properly.
-----Original Message-----
From: general-bounces at openid.net [mailto:general-bounces at openid.net] On
Behalf Of Martin Atkins
Sent: Tuesday, October 24, 2006 2:05 AM
To: general at openid.net
Subject: Re: security
James A. Donald wrote:
> Scott Kveton wrote:
> > Can folks give me an example of something that was > completely
> secure from day one and that got > wide-spread adoption?
>
> SSH was designed to be completely secure from day one, and except for
> the usual bugs, was.
>
> In contrast, we have *never* entirely succeeded in retroactively
> cobbling security on top of a protocol that was not designed from the
> beginning to be secure - in particular, secure modes for telnet, the
> primary competitor of SSH, never really worked.
>
> Because SSH has only one mode, and that mode secure, the user will
> seldom see an "are you sure" dialog, and is therefore not trained to
> click through that dialog.
>
I would argue that part of SSH's success in relation to other SSL-based
solutions is that it is not fundamentally based on certificates, and so
there's much less overhead to bootstrapping yourself; I just apt-get install
ssh and the package generates me a server keypair automatically; I don't
have to go though the arduous process of either getting a cert or
self-signing my own, and I don't get clients bitching at me every time I log
in because my cert is self-signed. It just works.
One of the main reasons why I don't use SSL on servers more is that SSL -
whatever protocol is bundled inside it -?is generally a pain in the ass.
_______________________________________________
general mailing list
general at openid.net
http://openid.net/mailman/listinfo/general
More information about the general
mailing list