Extracting ephemeral keys for session decryption

[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

 



Dear list members,

To decrypt SSH sessions, especially with PFS, the ephemeral keys
would be needed. I want to create a demo to show how this would
be working. I did a search but did not find material good enough
to start working on it immediately.

Are there any documents known, that describe how to proceed? I
do not care about the method: recompiling SSH, ptrace, kernel
module would be all fine to do it.

Without such information already available, where would be the
best position to tap in? For v2 PFS protocols key extraction is
a must, but of course it would be nice if same method could be
applied in general to eliminate the need to know at least server
or client private key. Is there an intersection in the code path
of DH/non-DH and perhaps v1/v2 session key generation?

Would it be sufficient to tap the key once and then follow only
the stream or would SSH go though full key renegotiation after
some while, thus repeated tapping is required?

I think the output of this could be a nice thing to learn from,
also for others. Therefore any help with the key extraction part
would be appreciated.

hd

PS: If demos are not yet available, everyone wanting to participate
in creating a demo is welcome! Intended output is blog post. No
companies, universities, military and no money involved!


_______________________________________________
openssh-unix-dev mailing list
openssh-unix-dev@xxxxxxxxxxx
https://lists.mindrot.org/mailman/listinfo/openssh-unix-dev



[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

[Index of Archives]     [Linux ARM Kernel]     [Linux ARM]     [Linux Omap]     [Fedora ARM]     [IETF Annouce]     [Security]     [Bugtraq]     [Linux]     [Linux OMAP]     [Linux MIPS]     [ECOS]     [Asterisk Internet PBX]     [Linux API]

  Powered by Linux