IETF-SSH archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
Re: tunneling and exec channel request support for SSH URIs
Jeffrey Hutzelman <jhutz%cmu.edu@localhost> writes:
> IMHO...
>
> - We _do_ want to be able to specify a username, and yes, even a password.
> Remember, you're not expressing the password of the user following the
> URI; you're expressing the password needed to access the resource. It
> is common to set up a resource which requires a username and password,
> and then advertise the username and password to a limited audience.
>
> - We _do_ want to be able to have URI's that refer to interactive
> shells, if only because this is the "main" service SSH provides.
>
> - We _do_ want to be able to have URI's that refer to connections
> to arbitrary subsystems. Some subsystems may be more useful to access
> in this way than others.
>
> - We _do_ want to be able to have URI's that refer to specific files
> accessed via SFTP. However, this probably wants to be a separate
> URI scheme.
>
> - We _do_ want to be able to have URI's that establish tunnels which
> allow the SSH client to connect to services on the SSH server's network.
> This type of tunnel is a common use of SSH, and makes sense both as a
> service and as a URI resource. It poses no threat to the user of such
> a URI, provided the selection of a port on the client end is up to the
> SSH client and _not_ contained in the URI, and that the SSH client takes
> the usual precautions for such tunnels.
>
> - We do _not_ want to be able to have URI's that establish tunnels which
> allow the SSH server to connect to services on the SSH client's network.
>
> - We do _not_ want URI's to be able to express preferences for algorithm
> selection in any form. This would amount to allowing the provider of a
> URI to override the client's security policy, which is a bad idea.
>
> - A user agent may wish to restrict what userauth methods can be used,
> based on its ability to handle user interaction or on local security
> policy. In fact, we probably should offer advice about taking care
> with the use of non-interactive authentication methods, lest an attacker
> trick a user into issuing a command to some service.
>
> - In a similar vein, probably we should not allow SSH URI's that direct
> the user to execute a particular command on a remote SSH server. That
> sounds exceedingly dangerous.
>
> - And, an SSH URI should not be able to control behaviors like agent
> forwarding, which again are a matter of client security policy and
> should not be subject to override.
All of this makes sense to me.
Regards,
/Niels
--
Niels Möller. PGP-encrypted email is preferred. Keyid C0B98E26.
Internet email is subject to wholesale government surveillance.
Home |
Main Index |
Thread Index |
Old Index