logoalt Hacker News

flumpcakesyesterday at 7:31 PM1 replyview on HN

> Couldn’t the MITM ssh server just forward the client’s fingerprint to the legitimate server?

Fingerprints are derived from the certificates/private keys. Unless I don't understand some basic crypto, or SSH works in some obtuse way, I do not think it would be possible for the MITM attacker to present the server with the true client's fingerprint unless they also had had the client's private key.


Replies

hnlmorgyesterday at 8:05 PM

Ah thanks for the explanation. It’s been a long long time since I’ve delved this deeply into the topic.