OpenSSH Key Storage

Michael T. Babcock mbabcock at fibrespeed.net
Sat Feb 2 05:19:11 EST 2002


On Fri, Feb 01, 2002 at 07:04:36PM +0100, Markus Friedl wrote:
> > No, you're blaming that supposed behaviour incorrectly; that
> > would happen already if the user connected to that machine that
> > way.  In fact, if I connect to my server on a different port, it
> > tells me the key has changed -- which it hasn't; its just a different
> > session.
> 
> well, show should ssh know?

SSH should know that a connection is a remote host + ip pair, the same as
TCP does, which SSH rides on.  Host+IP is how all connections in TCP are
described; we all know that.  How the user connects to the remote machine
is what is important; if I connect using an alias "Comp1" then I configure
that and go.  If I connect using specified ports, that should work equally
well.  You're confusing user behaviour and software behaviour I think.

> > This is fixed manually with the config file, but the behaviour you
> > describe could happen _now_, with or without my proposed change.
> 
> well, but your proposed change encourages this behaviour, while
> HostKeyAlias does not.

No, my proposed change simply decreases the need for HostKeyAlias which you
seem to like (and I don't think should be necessary in many cases).  My
proposal means that users (who have situations like the one I described) don't
have to contend with OpenSSH claiming their host key has changed; this leads
to people just always saying "yes" to the verification prompt and decreases
secure usage.

I cannot think of a good reason _not_ to support the storage of keys on a
host+ip basis.  It does not, in any case described, decrease security from
what we have now and I believe it increases security.
-- 
Michael T. Babcock
CTO, FibreSpeed Ltd.     (Hosting, Security, Consultation, Database, etc)
http://www.fibrespeed.net/~mbabcock/



More information about the openssh-unix-dev mailing list