UpdateHostkeys now enabled by default
Damien Miller
djm at mindrot.org
Sun Oct 4 14:02:42 AEDT 2020
On Sun, 4 Oct 2020, Christoph Anton Mitterer wrote:
> On Sat, 2020-10-03 at 19:44 +1000, Damien Miller wrote:
> > Otherwise, feel free to ask me anything.
>
> Was it ever considered that the feature itself could be problematic,
> security-wise?
Of course we considered this.
> I see at least two candidates:
> - It's IMO generally a bad idea to distribute "better/newer" keys over
> a potentially already weaker trust path (i.e. something secured by the
> old key).
This is strictly no worse than continuing to use the old key, so I don't
consider it a problem.
> - If some key was compromised (and thus the server itself) an attacker
> might use the feature to distribute his own keys, which, during clean
> up from the attack, might be overseen.
How is this different to the status quo? If you don't clean up keys after
a compromise then you have a problem. Anyone doing this already has to
be prepared to deal with multiple keys being known for a host. The tooling
support for doing this (ssh-keygen -R) works identically regardless of
the number of keys.
-d
More information about the openssh-unix-dev
mailing list