X-Git-Url: https://codewiz.org/gitweb?a=blobdiff_plain;f=website%2Fsimilar.mdwn;h=271d5ea17225e2e023fc3842bc6382914c67dcb1;hb=3e5df3def466a61cd32bdcc1fd29da09dff43729;hp=1a33b062430ff2caa46f9035a4a619554a29410b;hpb=7dfc00c5e8f11b0513d6d842196c6f43046f5309;p=monkeysphere.git diff --git a/website/similar.mdwn b/website/similar.mdwn index 1a33b06..271d5ea 100644 --- a/website/similar.mdwn +++ b/website/similar.mdwn @@ -1,4 +1,3 @@ -[[!template id="nav"]] [[meta title="Similar Projects"]] The monkeysphere isn't the only project intending to implement a PKI @@ -71,7 +70,8 @@ Some concerns with the Perspectives OpenSSH client: * This client won't help if you are connecting to machines behind firewalls, on NAT'ed LANs, with source IP filtering, or otherwise - in a restricted network state. + in a restricted network state, because the notaries won't be able + to reach it. * There is still a question of why you should trust these particular notaries during your verification. Who are the notaries? How @@ -85,6 +85,17 @@ Some concerns with the Perspectives OpenSSH client: * It doesn't provide any mechanism for key rotation or revocation: Perspectives won't help you if you need to re-key your machine. + * The most common threat which Perspectives protects against (a + narrow MITM attack, e.g. the attacker controls your gateway) often + coincides with the ability of the attacker to filter arbitrary + traffic to your node. But in this case, the attacker could filter + out your traffic to the notaries (or the responses from the + notaries). Such filtering (rejecting unknown UDP traffic, as + Perspectives appears to use UDP port 15217) is unfortunately + common, particuarly on public networks, even when the gateway is + not malicious. This reduces the utility of the Perspectives + approach. + ## OpenSSH with X.509v3 certificates ## Roumen Petrov [maintains a patch to OpenSSH that works with the X.509