[Bug 3155] New: openssh support hostkey encrypt

bugzilla-daemon at mindrot.org bugzilla-daemon at mindrot.org
Sun Apr 26 19:45:00 AEST 2020


https://bugzilla.mindrot.org/show_bug.cgi?id=3155

            Bug ID: 3155
           Summary: openssh support hostkey encrypt
           Product: Portable OpenSSH
           Version: 8.2p1
          Hardware: ARM64
                OS: Linux
            Status: NEW
          Severity: security
          Priority: P5
         Component: ssh-keygen
          Assignee: unassigned-bugs at mindrot.org
          Reporter: kircherlike at outlook.com

We noticed that the sshd.c file contained such a code snippet:
...
        for (i = 0; i < options.num_host_key_files; i++) {
                int ll = options.host_key_file_userprovided[i] ?
                    SYSLOG_LEVEL_ERROR : SYSLOG_LEVEL_DEBUG1;

                if (options.host_key_files[i] == NULL)
                        continue;
                if ((r = sshkey_load_private(options.host_key_files[i],
"",
                    &key, NULL)) != 0 && r != SSH_ERR_SYSTEM_ERROR)
                        do_log2(ll, "Unable to load host key \"%s\":
%s",
                            options.host_key_files[i], ssh_err(r));
...
By default, an empty string is used as the password for reading the
hostkey. When the hostkey is stolen, the third party can disguise as
the server to obtain some information about the SSH client. We want to
protect it by encrypting the hostkey. 

Can we use a non-empty string to encrypt the hostkey?

-- 
You are receiving this mail because:
You are watching the assignee of the bug.


More information about the openssh-bugs mailing list