[ale] emailing public dsa key (good, bad or ugly?)

Joe Knapka jknapka at kneuro.net
Thu Jan 26 02:12:23 EST 2006


James P. Kinney III wrote:

>On Wed, 2006-01-25 at 22:19 -0700, Joe Knapka wrote:
>  
>
>>Sid Lane wrote:
>>
>>    
>>
>>>hey,
>>>
>>>I am in the process of setting up an automated file transfer to an 
>>>external vendor who has agreed to scp over ssh2 but is asking me to 
>>>email the public key to them.
>>>
>>>is there any risk in doing this via email?  I understand the basic 
>>>principles of asymetric cryptography and that it shouldn't be possible 
>>>to decrypt w/the public key.
>>>      
>>>
>>Sure it is. You can decrypt any message encrypted with the private key.
>>
>>    
>>
>>>I was just wondering if there are any attacks/exploits that knowing it 
>>>make easier.  FWIW, box that will be pushing to them is behind (a 
>>>couple of) firewall(s) so nothing in the wild should even be able to 
>>>attempt to initiate an ssh (or anything else for that matter) to it.
>>>      
>>>
>>Wait...  *You* will be sending data to *them*? In that case, you need 
>>*their* public key,
>>not the other way around.  The public key is the one you encrypt with if 
>>you want your
>>message to stay private;  the private key is the one you encrypt with if 
>>you want the
>>receiver to be able to verify your identity.
>>    
>>
>
>I don't think this is correct. By putting your pub key on the remote
>server, the server uses that key to send the random string to you, which
>you get, decrypt and  then re-encrypt with the pub key the server just
>sent over. Now the server decrypts the string you sent and that verifies
>you are who you claim to be. Once the user authentication is over, the
>server and client generate a random string that gets "glued" by
>the ?server?. This is the encryption key for a while. It is a fast key
>(like blowfish) and the key is changed often. The secret to this mess is
>the key pieces are sent encrypted with the pub keys so no snooper can
>get them.
>
>The pub key can only encrypt. The private key can only decrypt. In some
>  
>
That depends on exactly which encryption system you're using; there 
definitely
are PK systems where either key can decrypt messages encrypted by the
other.  It's been a long while since I read my Schneier, so I'm sure 
you're right
about the protocol.

Cheers,

-- JK





More information about the Ale mailing list