IETF-SSH archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
Re: [ssh] Host key sync - "global-requests-ok" extension
ietf-ssh3%denisbider.com@localhost <ietf-ssh3%denisbider.com@localhost> writes:
>In our 8.xx versions up to 8.19, the SSH Server will unconditionally send
>this global request after successful authentication to inform the client
>of its other host keys. This allows a client to auto-verify those host
>keys, allowing for host key rotation.
Do you have a test server up that we can run clients against?
>We suspect some users may also be using ancient OpenSSH versions on their
>production servers that cannot be upgraded. This may include versions
>before 3.1, which first supported client-side receipt of global requests.
I ran into one only recently, 3.something, where something was probably 7,
which had an interesting bug: If you connected and sent a
SSH_MSG_KEX_DH_GEX_REQUEST, it returned in invalid keyex signature. If you
sent a SSH_MSG_KEX_DH_GEX_REQUEST_OLD, it worked. 3.7 is from 2003 whereas
RFC 4419 is from 2006, postdating the implementation. My guess is that it
computes the signature over some form of the _REQUEST_OLD information rather
than the newer _REQUEST info, but I haven't bothered looking at the code.
While I'm on the subject of OpenSSH, why the *&(*)&() does it disable all
the mandatory-to-implement symmetric ciphers in its default configuration
post 7.x? It can't really be called an implementation of the SSH spec if
no MTI ciphers are supported in its out-of-the-box config.
Peter.
Home |
Main Index |
Thread Index |
Old Index