IETF-SSH archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
Re: draft-ietf-secsh-gss-keyex and null host keys
On Tue, 2005-04-12 at 10:38, Sam Hartman wrote:
> >>>>> "Bill" == Bill Sommerfeld <sommerfeld%sun.com@localhost> writes:
>
> Bill> (and complicating #1 is the interaction with the SSH DNS
> Bill> fingerprint document, because that *is* a way of securely
> Bill> exchanging the fingerprints out of band, at least if dnssec
> Bill> is turned on...)
>
> I'd argue that gss-authenticated keys are out-of-band in the same
> sense that the dns document is. The signed key is exchanged by a
> mechanism that does not depend on that key being a trust anchor for
> the security of the exchange. I.E. in one case my trust anchor is
> some DNS related key, in another case it is a Kerberos key or some
> other GSS credential
if there are multiple potential sources for a given host's key, they
could disagree.
at the very least we need to provide a clue to implementors for what to
do in the event of a disagreement between allegedly-authoritative
sources of information on the host-to-host-key binding.
- Bill
Home |
Main Index |
Thread Index |
Old Index