OpenSSH Key Storage

Nicolas Williams Nicolas.Williams at ubsw.com
Sat Feb 2 06:10:09 EST 2002


On Fri, Feb 01, 2002 at 01:26:15PM -0500, Carson Gaspar wrote:
> 
> 
> --On Friday, February 01, 2002 10:08 AM -0500 Nicolas Williams 
> <Nicolas.Williams at ubsw.com> wrote:
> 
> > SSH RSA/DSA keys are nameless. Whatever name the server tells the client
> > it has seems to me should be suspect.
> 
> Of course it's suspect. Which is why the client must validate the host key. 
> Possesion of the key material _is_ identity, as far as SSH is concerned. 
> Anything else requires a trusted third party. A kerberos KDC is a good 
> trusted third party. A CA is a semi-trusted third party, in my opinion. The 
> global DNS is an almost completely untrusted third party. Which one do you 
> propose using?

I proposed nothing :)

But I do use Kerberos (with OpenSSH too).

> -- 
> Carson


Nico
--
-DISCLAIMER: an automatically appended disclaimer may follow. By posting-
-to a public e-mail mailing list I hereby grant permission to distribute-
-and copy this message.-

Visit our website at http://www.ubswarburg.com

This message contains confidential information and is intended only 
for the individual named.  If you are not the named addressee you 
should not disseminate, distribute or copy this e-mail.  Please 
notify the sender immediately by e-mail if you have received this 
e-mail by mistake and delete this e-mail from your system.

E-mail transmission cannot be guaranteed to be secure or error-free 
as information could be intercepted, corrupted, lost, destroyed, 
arrive late or incomplete, or contain viruses.  The sender therefore 
does not accept liability for any errors or omissions in the contents 
of this message which arise as a result of e-mail transmission.  If 
verification is required please request a hard-copy version.  This 
message is provided for informational purposes and should not be 
construed as a solicitation or offer to buy or sell any securities or 
related financial instruments.




More information about the openssh-unix-dev mailing list