Re: HostKeyAgent from hardware

[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

 



On Thu 2015-05-28 16:49:45 -0400, Mike Tancsa wrote:
> I have been exploring generating a host's RSA key from a PKCS#15 token. 
>   I got it to work with an old SafeNet/Aladdin eToken (non java version) 
> using OpenCT and OpenSC on FreeBSD.  (The steps I used at 
> http://www.tancsa.com/mdtblog/?p=73).

My guess is that these devices would be too slow for use on the public
internet -- i've seen many of them take > 1 second for a 2048-bit RSA
secret key operation.  Since the server has to sign part of the
handshake relatively early (before the client is authenticated), an
attacker could tie up the token just by starting a handshake and forcing
the signature, i think.  

This would make your server trivially easy to DoS at a very low
bandwidth, no?  I haven't tried the attack myself.

> Apart from this increasingly hard to get bit of hardware, what other 
> hardware devices are people using to access ssh host keys in where 
> necessary with OpenSSH in the *BSD or Linux world ? Hopefully devices 
> that have quantities of < 50 available, and I dont have to be a country 
> to buy them ? Or do people just look for servers that have TPMs 
> integrated into them ?

I'd be curious to hear other answers to this too.

    --dkg
_______________________________________________
openssh-unix-dev mailing list
openssh-unix-dev@xxxxxxxxxxx
https://lists.mindrot.org/mailman/listinfo/openssh-unix-dev




[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

[Index of Archives]     [Linux ARM Kernel]     [Linux ARM]     [Linux Omap]     [Fedora ARM]     [IETF Annouce]     [Security]     [Bugtraq]     [Linux]     [Linux OMAP]     [Linux MIPS]     [ECOS]     [Asterisk Internet PBX]     [Linux API]

  Powered by Linux