Summary: | default /etc/ssh/ssh_config should include option HashKnownHosts for known_hosts | ||
---|---|---|---|
Product: | Gentoo Linux | Reporter: | Brian G. Peterson <brian> |
Component: | Current packages | Assignee: | Daniel Ahlberg (RETIRED) <aliz> |
Status: | RESOLVED WONTFIX | ||
Severity: | normal | CC: | christoph.gysin, security, vapier |
Priority: | High | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Package list: | Runtime testing required: | --- |
Description
Brian G. Peterson
2005-05-17 06:31:40 UTC
not a 'real' security issue our default ssh_config doesnt turn on any options ... but we could easily change that any other settings to suggest defaults for ? The defaults are fine for me except for this hash setting. As the MIT paper and Bruce Schneier's article point out, using a Hash is a simple effective security measure that should probably be on by default. Hopefully someone with commit access can make and test this one-line change to the /etc/ssh/ssh_config file. This breaks bash-completion among other things that depend on the existing behavior. Turn on hashing and in due time the worms out there will adapt including a their own hashing algorithms, looking at open sockets, .history files and many other tricks to obtain peers. Turning the option on doesn't make you less vulnerable, it just make it a /little/ more difficult for the worm to compute targets. So what ? They will rely on dumber (brutescans) or smarter (bash_history, traffic analysis, delayed propagation) methods to find the next target. On the other hand, it breaks existing functionality (bash completion), and make us derive from upstream default configuration (which is what people expect to find). I don't think it's worth it. If it goes on by default in OpenSSH, then we'll keep it. Or if our OpenSSH maintainers want it... but the security team won't pressure them to. good thoughts, thanks |