IETF-SSH archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

Re: Revised Publickey subsystem draft



> a) Does anyone have some suggested text for a security
considerations
> section?  That the protocol assumes it's running over a secure
transport
> layer would seem to be fairly standard, for starters.

What about this for a first pass on Security Considerations. 
Note, this text is inspired by and almost identical to similar 
statements in SFTP's security considerations:

  This protocol assumes that it is run over a secure channel and that
  the endpoints of the channel have been authenticated.  Thus, this
  protocol assumes that it is externally protected from network-level
  attacks.

  This protocol provides a mechanism that allows client authentication
  data to be uploaded and manipulated. It is the responsibility of the 
  server implementation to enforce any access controls that may be 
  required to limit the access allowed for any particular user (the 
  user being authenticated externally to this protocol, typically 
  using the SSH User Authentication Protocol [8].

I was wondering also if something needs to be said about users
applying/erasing "command" attributes in such a way that the publickey
subsystem might be used by a user to override some restrictions on
that user's account that an administrator thought were securely in place.
eg. Once authenticated with a key that always execs some restricted command
shell, the user then uploads a key that has no such restictions. I'm not 
really sure if this is how this "command" feature is used by admins
on servers that support it, but if it were the case then perhaps
some language about implementations needing to allow configuration
to disable access to this subsystem for such users. OTOH, maybe the 
second paragraph above covers that.

--Brent



Home | Main Index | Thread Index | Old Index