Security Focus Interviews Damien Miller 80
An anonymous reader writes "The upcoming version 4.3 of OpenSSH will add support for tunneling allowing you to make a real VPN using OpenSSH without the need for any additional software. This is one of the features discussed in SecurityFocus' interview of OpenSSH developer Damien Miller. The interview touches on, among other things, public key crypto protocols details, timing based attacks and anti-worm measures."
Effective cryptography is a hard problem. (Score:5, Informative)
For example, if you create a VPN with this latest OpenSSH, a lossy network will hold up your traffic. Despite the fact that TCP/IP will try to continue operating with dropped packets, with OpenSSH if you miss one packet the loss cascades into succeeding packets until the client and server are able to resync or the packet is delivered. This accumulation of tolerances is not a problem with IPsec, which is designed cipherwise to work around occasional packet loss.
Most experts agree the product of the best cryptography will be indistinguishable from random noise. This means that it is difficult to share the benefits of compression with file encryption because random noise compresses very poorly, as anyone who attempts to archive their MP3s of today's artists will attest. Additionally, if you accidentally store your encrypted files amongst files containing random noise you run the risk of generating new data during decryption.
The secret is to understand the technology before you use the technology. The problem with encryption is twofold -- some people are overconfident in what they're using and either lose data or risk more than they would if they were fully informed, and others think it's too difficult a topic to broach and leave themselves open to exploitation by network explorers. Certainly when I was in the second category I became convinced of the problem once I saw tools like 'tcpdump' and 'ethereal'.
Re:Effective cryptography is a hard problem. (Score:5, Insightful)
Surely not if you compress it and _then_ encrypt it?
Re:Swapping the order introduces other problems (Score:3, Informative)
You're spouting complete nonsense. A secure block cipher in a secure mode of operation revelals nothing about the similarities between files. Loock up CBC mode on Google - a large random initialization vector is used to ensure that identical (or similar) plaintext blocks encrypt completely differently. I also suggest a thorough reading of Applied Cryptography by Bruce Schneier.
OpenPGP, for example, uses gzip compression before encryption with every file. Yet PGP is widely considered very secure. Why? Becau
Re:Effective cryptography is a hard problem. (Score:4, Funny)
Re:Effective cryptography is a hard problem. (Score:2)
Yes and no. (Score:5, Interesting)
Secondly, cryptography is generally expensive on the CPU but cryptographic processors exist. Motorola's processor unit (before they spun it off) had a very nice unit called the S1, which could encrypt or decrypt four streams in parallel. They had a very nice manual, describing the complete protocol to communicate with it. Despite this, I never have yet seen a Linux driver for it. A pity, regardless of what you think of the S1, simply because it would have been a good opportunity to win over those who do use such chips.
TCP offload engines are also beginning to come into the picture. When TCP stacks didn't do a whole lot, it cost more to offload than you'd gain by having a co-processor. These days, a glance at the multitude of QoS protocols defined in papers, the staggering range of TCP algorithms in Linux, and the complex interleaving of the Netfilter layers -- it almost has to be better to have all that shoved onto a network processor.
(Notice that I'm including more than just the basic operations here. It's the ENTIRE multitude of layers that is expensive. Linux supports Layer 7 filtering, virtual servers, DCCP. There's even an MPLS patch, if anyone cares to forward-port it to a recent kernel. IGMPv3 isn't cheap, cycle-wise. Nor is IPSec.)
There is also the crypto method to consider, too. RSA is expensive but ECC and NTRU are considerably cheaper. SHA-1 is much slower than TIGER and is not clearly better. Whirlpool is also better than SHA-1 on speed and strength.
I'll also mention that OpenSSH is sub-optimal on the implementation, that there are patches out there to make it faster. I mentioned those the last time OpenSSH became a hot topic. Even if the patches themselves aren't "good enough", they must surely be evidence that it is possible to tighten the code a great deal in places. If nothing else, slow code is more vulnerable to DoS attacks.
Re:Yes and no. (Score:1)
Re:Yes and no. (Score:3, Interesting)
The problem is that TCP over TCP just doesnt work and has well understood and well documented perfromance characteristics.
IPsec which does work, as CIPE and things like IPIP and GRE all have in common that they do NOT use TCP as a transport. IF you use TCP as transport for the tunnel and IF you transport TCP atop said tunnel it will just not work.
When tail packetloss
TCP over TCP (Score:2, Insightful)
Re:SHA-1 Encryption - What's that? (Score:2)
RSA and ECC are not used for bulk encryption because they are computationally too expensive. If t
Re:Effective cryptography is a hard problem. (Score:5, Informative)
On the other hand, if TCP-over-TCP is your only option (eg. due to the lame firewall my employer set up), then SSH is a great option.
But what does that have to do with increasing security again?
Re:Effective cryptography is a hard problem. (Score:1)
Re:Effective cryptography is a hard problem. (Score:2)
To wit: Additionally, if you accidentally store your encrypted files amongst files containing random noise you run the risk of generating new data during decryption. Didn't anyone read this post before they moderated it?
Re:Effective cryptography is a hard problem. (Score:1)
So you are saying it will be written in Perl?
Re:Effective cryptography is a hard problem. (Score:2)
ef-fect tr.v. 1. To bring into existence. 2. To produce as a result. 3. To bring about.
af-fect n. 1. Feeling or emotion, especially as manifested by facial expression or body language: "The soldiers seen on television had been carefully chosen for blandness of affect" (Norman Mailer).
Re:Effective cryptography is a hard problem. (Score:2)
Thanks guys (Score:5, Informative)
FINALLY! (Score:2)
Hacker Summary (Score:5, Informative)
For those hackers who are already familiar with the forwarding features of ssh (-L, -R and -d options), and who are wondering what the hell is this new "support for tunneling", here is a hacker summary. Quoting TFA:
Tun(4) interfaces are indeed very convenient. That's all folks !
Re:Hacker Summary (Score:4, Insightful)
Great detailed article - way to go OpenSSH'ers (Score:2)
telnet forever! (Score:5, Funny)
login: mr_moo
password: moowoo
> lynx slashdot.org
ssh is great and all but telnet is secure enough for me as far as __ALL_YOUR_BASE_ARE_BELONG_TO_US__ wha? who typed that? what's __H4X0RZ_4EVA!__
CONNECTION TERMINATED.
Re:telnet forever! (Score:2)
Tunneling with servers (Score:2)
Re:Tunneling with servers (Score:1)
Except that older sshd don't have the ability to honor requests to forward to any random port on-the-fly, AFAIK. You specify which ports you're gonna forward at connection time.
Re:Tunneling with servers (Score:1)
I disagree on one point. (Score:5, Interesting)
Blacklisting will at least make it harder for stupid bots.
Re:I disagree on one point. (Score:2)
Getty does it, and for good reasons. I don't see why sshd should not.
Re:I disagree on one point. (Score:3, Informative)
Re:I disagree on one point. (Score:1)
That is a handy piece of code you've pointed out there.... thanks.
kick arse vpn (Score:4, Informative)
http://www.hamachi.cc/ [hamachi.cc]
Loos like a better way of doing VPN.. though ssh with in built vpn is going to be nice...
Like OpenVPN, only proprietary (Score:1)
Looks nice, but nothing spectacularly new. It might be handy if y
Re:Like OpenVPN, only proprietary (Score:1)
OpenVPN and NAT-to-NAT (Score:1)
They even give specific examples of how to use it in combination with OpenVPN.
Moreover, this technique looks like it should work with any kind of NAT, whether full-cone, restricted-cone, or symmetric. On the other hand, the "third-node" (mediator) technique will not work with symmetric NAT.
Hamachi and NAT-to-NAT (Score:2)
Looks can be deceiving. Hamachi's main strength IS its NAT traversal capabilities. In addition to symmetric, cone-this, cone-that types, it supports traversing a handful of completely obscure NAT types. Like reverse sequential NAT (external ports are allocated in decreasing order), burst overloaded NAT (ports are incremented in random increments), and random port NAT. Statistically it can connect 95% of all UDP-capable peers. The rate
Re:kick arse vpn (Score:3, Informative)
Anyone seen this before?: http://www.hamachi.cc/ [hamachi.cc]
Loos like a better way of doing VPN.. though ssh with in built vpn is going to be nice...
Here's my not so humble opinion about Hamachi:
Software review: Hamachi [filion.org]
In short: some good, some bad, some really great, some horrible.
Your review is strange to say at least (Score:2)
No, it is not. It's exactly the opposite. The address is private and globally UNroutable.
Who the fuck do they think they are distributing IP addresses like that?
Hamachi uses 5.0.0.0/8 for *private* networking. We are not distributing Internet addresses, we are distributing IPs used in Hamachi's own routing domain. Which of course is fully isolated from Internet.
The only problem Hamachi can run into later on is if IANA starts assigning IPs from this subnet
Re:kick arse vpn (Score:3, Insightful)
Re:kick arse vpn (Score:2)
Alex (ap@hamachi.cc)
Re:kick arse vpn (Score:2)
Re:kick arse vpn (Score:2)
I dealt with IPsec *very* extensively in the past and in the first revision we were in fact using IKE for p2p and SSL for client-server security. The issue was essentially that IKE was an overkill and SSL added 4 extra messages to the login sequence. Former affected development schedule and latter affected server performance under the load (yes, I am aware of HW SSL accelleration, it was not an option at that moment).
For the second revision we stripped down al
SSH tunnels is a stupid idea. (Score:3, Interesting)
SSH uses TCP as transport. You should NOT transport TCP/ip ontop of TCP. TCP over TCP has well known and well documented poor performance characteristics.
Google for TCP over TCP to find any number of researchpapers on why this just doesnt work, or try running IP traffic yourself across an SSH tunnel and find out first hand why TCP over TCP just dont work well.
Maybe, I hope, they plan to add a new SSH mode that uses UDP and will use UDP-SSH as basis for the tunnel. That would work. But you can neveruse more than one single TCP layer in any stack. If not (i.e. they plan to tunnel traffic atop a TCP ssh session) it will fail and they will learn.
VPN over TCP (Score:2, Redundant)
to completely escape the attention of people promoting this type
of VPNs.
TCP is an UNAUTHENTICATED sessioned transport and the state of
entire VPN DEPENDS on it. Anyone capable of closing TCP session
can bring VPN down. Moreover VPN nodes may not even get a chance
to exchange a single packet if an attacker proactively resets all
connection attempts.
This is drastically different from standard VPNs that use IP or
UDP for data delivery. In order for a
sections of interview are hidden / commented (Score:1)
Re:sections of interview are hidden / commented (Score:2, Interesting)
Another statistic suggests that more than 80% of the SSH servers on the Internet run OpenSSH. I'm wondering if you have ever verified which version they are running, and what is the average behaviour of an OpenSSH administrator. Does people update the server as soon as a new release is available?
Damien Miller: Funny you mention this, we just completed another version survey with the assistance of Mark Uemura from OpenBSD Support Japan. The results of this should be going u
Re:sections of interview are hidden / commented (Score:1)
maybe a new form of stenography? or maybe its eliptical curve control to aid with the slashdotting?
I wonder, do you check your logs as as vigourously as you do websites html source?
Lets do a bit of SCHADENFREUDE! (Score:2)
OK but ... (Score:2)
Re:OK but ... (Score:2)
If they keep going they can make another OpenVPN (Score:1)
Software free tunneling (Score:1)
Re:Software free tunneling (Score:2)
#AllowTcpForwarding yes
#PermitTunnel no
You can disable TCP forwarding if you want
You have to manually enable tunneling as it appears it is not on by default
A brute force attack is no more feasible than it was before. Don't use password auth (or use good passwords) and you should be just fine.
Also, if you have SSH access to an SSH server, you can likely already then access most devices that the SSH server can access already.
I would trust an OpenSSH based VPN more than
Damien (Score:3, Funny)
Re:chroot (Score:3, Informative)
Miller? (Score:1)
SSH is SSH and VPN is VPN (Score:2)
Frankly, we're pretty happy using SSH as it is right now. I'd like to see something like easier tunneling of X of an SSH session. Other than that, unless you can spank t
Re:SSH is SSH and VPN is VPN (Score:1, Informative)
WHAT???
You, "olde scholar" find too dificult just `ssh -X user@host` and then `startx`?
Now: how can it be any easier!?