[TriLUG] Semi-OT: Detecting HTTPS inspection? Does that compromise SSH?
Brian
lugmail at cheetah.dynip.com
Mon Jun 2 17:05:50 EDT 2014
On 6/2/2014 4:42 PM, matt at noway2.thruhere.net wrote:
> With SSH, I assume you established the original connection outside of your
> company (suspect) network? This would have caused the fingerprint hash of
> the SSH server to be stored in the client. If the certificate were forged
> or altered you would get a very prominent message about an altered
> fingerprint asking you if you wish to trust it.
>
> In other words, as long as you didn't create the initial connection and
> accept a fingerprint that could have been compromised then I seriously
> doubt that they can decrypt your SSH traffic. If you did, then you should
> be getting warnings if you try to connect via SSH when your NOT behind
> their MITM proxy.
>
What I did was remove the entry from PuTTY's known-hosts cache and
reconnect, then observe that the RSA fingerprint PuTTY showed me for the
now-untrusted connection matched the fingerprint I got when I used
ssh-keygen -l to list the fingerprint on the server.
So I think I'm relatively safe on that front, at least. I may have to
stop doing any online banking from the office, though.
Thanks!
~B
More information about the TriLUG
mailing list