IETF-SSH archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

Re: PublicKeyFile Format Security Considerations



> After all
> if what I wrote above is just another way of saying "Implementors should
> avoid bugs, and especially buffer overruns in their code" then maybe
> it doesn't add anything of value.

It does seem to be the case that the text we're discussing covers a
subject that is assumed to be obvious in just about every other IETF
document.  If we want to say ``don't write buffer overflows, and
verify your data, and stuff'' in a very general way, it might be
appropriate to write up a protocol-independent RFC saying those
things, and have the security considerations section of every RFC
refer to that generic, protocol-independent writeup.  This discussion
makes me wonder if it is a bug that there is no RFC talking about
buffer overflows, as far as I know.  There *is* an RFC about random
numbers, for example.  But I'm sure an RFC about buffer overflows is
beyond the scope of this working group.

If there is a specific reason why being careful about parsing the data
is more important, or more difficult, or more subtle with an ssh
public key file than in a generic case of parsing data, then
explaining that would be useful.






Home | Main Index | Thread Index | Old Index