I have enabled SSH inspection on a firewall.
I am able to SSH successfully to a server with password
authentication; however, when I use public key authentication, it
fails.
Is there any possible workaround? For instance disabling integrity
checking (which doesn't appear to be possible in OpenSSH.)
Hi,think this should be technically possible.
I have enabled SSH inspection on a firewall. I am able to SSH successfully to a server with password authentication; however, when I use public key authentication, it fails.
Originally, I thought that would be expected, as the proxy doesn't have the private key of the client. However, I was looking at the SSH RFCs and the secure transport layer should be established independent of the authentication method, so I would
I would guess that the problem has to do with the data integrity portion of the protocol; however, I am seeing in the SSH debugs that authentication is failing.pass on the same session ID.
Information on the firewall vendor sites suggests that this doesn't work in their implementation.
Is SSH intercept technically possible with public key authentication? If not why? I have seen it mentioned on here that firewalls will break the session id, and it is part of the signature (see below.) However, I don't see why the firewall wouldn't
Is there any possible workaround? For instance disabling integrity checking (which doesn't appear to be possible in OpenSSH.)
Thanks a bunch for the help!
RFC 4252 SSH Authentication Protocol January 2006
The value of 'signature' is a signature by the corresponding private
key over the following data, in the following order:
string session identifier
byte SSH_MSG_USERAUTH_REQUEST
string user name
string service name
string "publickey"
boolean TRUE
string public key algorithm name
string public key to be used for authentication
Sysop: | Keyop |
---|---|
Location: | Huddersfield, West Yorkshire, UK |
Users: | 447 |
Nodes: | 16 (2 / 14) |
Uptime: | 60:14:47 |
Calls: | 9,250 |
Calls today: | 2 |
Files: | 13,499 |
Messages: | 6,067,441 |