Hi,

I saw that you wrote:

> If an attacker were to control a rogue SSH server, then he would be better
> off submitting a perfectly valid signature instead of a malformed one, and we
> would log into it anyways. Hence, there is absolutely no security risk
> associated with the misuse of this function.

I would like to start by saying that I have no idea how it works.
But I have to wonder why you call DSA_do_verify() if it the result
has no impact on the security.

Did you considered a man in the middle attack, where the attacker
could impersonate the 2 other parties and have full control over
the connection?


Kurt




-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to