IETF-SSH archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
Re: Rekey issue
Mouse <mouse%Rodents-Montreal.ORG@localhost> writes:
>>> I can see at least three ways of dealing with this: (1) [...], (2)
>>> [...], and (3) when rekeying, behave as normal except that a second
>>> copy of the host key from the first time around is, effectively,
>>> added as a trusted key for the host.
>
>> OpenSSH does:
>
>> (4) silently accept the hostkey if it is identical to the one used to
>> authenticte the previous KEX, search the known hostkeys otherwise and
>> if not found there then do whatever is configured for hiterto-unknown
>> hostkeys.
>
> I must be missing something. To me, this sounds like (3). What's the
> difference?
Not sure if the distinction was intended, and if so, if it matters, but
consider the case where the same (previously unknown) host key A occurs
in the first and third key exchange, but a distinct host key B is used
(and somehow accepted) in the second keyexchange.
In this scenario, (3) unconditionally accepts A as trusted when it
returns in the third key exchange, while (4) doesn't.
Regards,
/Niels
--
Niels Möller. PGP-encrypted email is preferred. Keyid C0B98E26.
Internet email is subject to wholesale government surveillance.
Home |
Main Index |
Thread Index |
Old Index