authorized_keys2 directory idea

Theo de Raadt deraadt at cvs.openbsd.org
Sat Jun 9 07:51:25 EST 2001


We have already discussed this at length.

Sorry.

> My $0.02: I'd like to see this feature.
> 
> I'm not really concerned with the authorized_keys{,2} entries.  Where
> I think the feature would be a win is with known_hosts{,2}.  My
> known_hosts file currently has 50+ entries, and it's a royal PITA to
> maintain them.
> 
> The easiest way I've found to reliably keep files in sync across
> different machines is rsync-over-ssh.  That works great if the
> granularity of change you're dealing with is a file, because rsync is
> flexible enough to express conditions like:
> 
>     1.  Only add files that do not exist on the target.
>     2.  Don't overwrite newer files on the target.
>     3.  Delete files that exist on the target but not on the source.
> 
> But when the granularity of change is the *content* of an individual
> file, this won't work.  All I can tell using rsync is that the files
> differ.  To tell what those differences are, I have to scp the remote
> file to the local system, diff it, figure out how to reconcile the
> differences, modify the local version of the remote file, and then scp
> it back to the remote system.
> 
> Now repeat this about a dozen times or so.  It's a big waste of time,
> and it's not fun.
> 
> And yes, this task would be simpler if I could always push my changes
> out immediately after I make them.  But that's not always possible
> (due to firewalls and depending on whether I'm at work, home, or on
> the road).  And it's not always desirable either: my known_hosts files
> are not strictly identical across all of the machines I access.  (I
> could, however, express "push-only-if-older-version-exists-on-target"
> using rsync.)
> 
> On Sun, 3 Jun 2001, Markus Friedl wrote:
> > i don't understand why editing a file is hard.  i think keeping a
> > file in sync is simpler than syncing directories, especially
> > deleting files.
> 
> It might be simpler for you, but that doesn't mean it's simpler for
> everyone.
> 
> On Sun, 3 Jun 2001, Theo de Raadt wrote:
> > OpenSSH is security software.  A lot of you keep asking for more and
> > more features, and the code keeps growing and growing and growing.
> > Assuming that the number of lines per bug is a constant, how long
> > before one of these features which noone uses becomes a hole?
> 
> You have a good point: it would be unwise to carelessly add additional
> features to OpenSSH.
> 
> However, good software grows or dies, and OpenSSH is no exception.
> Carelessly *refusing* to add additional features to OpenSSH will
> damage the project every bit as much (if not more so) than carelessly
> adding additional features, because the former will antagonize more
> people (including supporters and contributors, both current and
> potential) than the latter.
> 
> And in terms of this feature, the complexity added is minimal.
> Processing the subdirectory shouldn't require special pains, because
> it exists in the user's ~/.ssh directory.  If attacker can create
> files or directories in the user's ~/.ssh directory, it's already Game
> Over.
> 
> The effort required by the OpenSSH developers is also negligible,
> because Pekka offered to write the patch.  (Or at least that was my
> interpretation; Pekka, please correct me if I'm placing words in your
> mouth.)
> 
> I realize opinions may have been somewhat polarized by the resulting
> almost-flamefest, but I think Pekka's original suggestion had merit.
> Markus et. al., please [re]consider it.
> 
> -- 
> James Ralston, Information Technology
> Software Engineering Institute
> Carnegie Mellon University, Pittsburgh, PA, USA
> 




More information about the openssh-unix-dev mailing list