IETF-SSH archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

Re: WG chair nits on draft-ietf-secsh-dns-02.txt



On Friday, March 21, 2003, at 12:18 AM, Bill Sommerfeld wrote:

An alternate approach which I think is superior is to ensure that the
DNS search path used while resolving SSHFP records comes from a trusted
source (i.e., not from DHCP or PPP/ipcp).

how can the ssh client implementation ensure that?

The ssh client can't, but a system containing an ssh client could.

Security considerations are not just for subsystem implementors;
they're also for the users..

Agreed. I put this paragraph together last week, it addresses the search path concerns through configuration of the "system" instead of the implementation.

Index: draft-ietf-secsh-dns-xx.xml
===================================================================
RCS file: /cvs/sshdev/draft/draft-ietf-secsh-dns-xx.xml,v
retrieving revision 1.44
diff -u -r1.44 draft-ietf-secsh-dns-xx.xml
--- draft-ietf-secsh-dns-xx.xml 20 Mar 2003 00:42:42 -0000      1.44
+++ draft-ietf-secsh-dns-xx.xml 20 Mar 2003 23:31:06 -0000
@@ -315,6 +315,15 @@
    </t>

    <t>
+ A different approach to solve the DNS search path issue would be for
+    clients to use a trusted DNS search path, i.e., one not acquired
+    through DHCP or other autoconfiguration mechanisms. Since there is
+ no way for the DNS lookup APIs to tell whether a search path is from
+    a trusted source, the entire client system would need to be
+    configured with this trusted DNS search path.
+   </t>
+
+   <t>
     Another dependency is on the implementation of DNSSEC itself.  As
     stated in <xref target="auth"></xref>, we mandate the use of
     secure methods for lookup and that SSHFP RRs are authenticated by




Home | Main Index | Thread Index | Old Index