You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Man in the middle attack vector found in sshconnect.c
Duplicate:
Add ssh key for remote server, but add wrong IP
ssh now prompts: Are you sure you want to continue connecting? yes/no
User enters yes but then realizes, oh boy, it's a man in the middle attack, and yet the backspace key is broken (thanks, peanut butter). So then ultimately submits yes_waitnobackspaceisbroken
Validation fails, ssh accepts the yes answer. The database and files are hacked and everything lost. The CTO writes a blog post on Medium as a postmortem, but loses entire customer base. Great, ssh.
constchar*msg, *again="Please type 'yes' or 'no': ";
The check for the yes value only checks to see that yes is at position 0. If the user types in yesohwaitmybackspacekeyisbroken_imeantno they will be potentially vulnerable to a man in the middle attack, not knowing the validation has failed them.
Scary stuff.
The text was updated successfully, but these errors were encountered:
Whether or not you can delete keystrokes in the buffer via backspace is determined by multiple factors.
Sorry, but I failed to see the connection how that makes it a MITM vulnerability.
If you want to quit the ssh client immediately during host key confirmation, use Ctrl+C or kill command.
If you would like to remove a public key from the known hosts, read the manual of ssh-keygen.
If you realized but not knowing the validation has failed and keeps on entering your password*, the software is not to be blamed, you are.
*: In key-based authentication, your private key is never sent to the server/attacker. Only password-based authentication may be affected by your proposed MITM scheme.
The line you're referring to is from pristine OpenSSH 5.2 source [git blame]. I failed to find any related CVE on MITM vulnerability for OpenSSH 5.2. Even if it has known vulnerabilities, I wouldn't be surprised, given that it's released almost 10 years ago.
It would be responsible to report any security issue privately with the maintainers instead of in a public place like GitHub issues.
Man in the middle attack vector found in
sshconnect.c
Duplicate:
yes
but then realizes, oh boy, it's a man in the middle attack, and yet the backspace key is broken (thanks, peanut butter). So then ultimately submitsyes_waitnobackspaceisbroken
yes
answer. The database and files are hacked and everything lost. The CTO writes a blog post on Medium as a postmortem, but loses entire customer base. Great, ssh.See line here:
obfuscated-openssh/sshconnect.c
Line 570 in ca93a2c
The check for the
yes
value only checks to see thatyes
is at position 0. If the user types inyesohwaitmybackspacekeyisbroken_imeantno
they will be potentially vulnerable to a man in the middle attack, not knowing the validation has failed them.Scary stuff.
The text was updated successfully, but these errors were encountered: