NetBSD-Users archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
Enabling VerifyHostKeyDNS option in /etc/ssh/ssh_config
Dear list,
Following a recent change of host key on a NetBSD server, I would like
to propose the following change:
--- ssh_config.orig 2013-09-26 23:56:00.000000000 +0200
+++ ssh_config 2013-09-26 23:55:38.000000000 +0200
@@ -48,3 +48,7 @@
# ProxyCommand ssh -q -W %h:%p gateway.example.com
# If you use xorg from pkgsrc then uncomment the following line.
# XAuthLocation /usr/pkg/bin/xauth
+
+# Some NetBSD's hosts provide SSHFP records - try checking them
+Host *.netbsd.org
+ VerifyHostKeyDNS ask
This would enable SSHFP DNS checks against hosts' keys; spz@ updates
these regularly for hosts managed by TNF.
This will only add benefit to people that would like to connect to ssh
hosts without a previously validated key (the Trust On First Use remains
the usual way of doing).
They can obtain the fingerprint from a third party entity, which is
still better than nothing.
Note that without DNSSEC, the SSHFP record is just an indication - but
that is a separate issue to this option, and more resolver's matter.
For hosts that are already part of /etc/ssh/ssh_known_hosts with a valid
key, nothing will change. For hosts with an incorrect key this will
print the usual MITM warning.
I cannot see any real drawback to enabling it. Opinions before I commit
this?
Cheers,
--
Jean-Yves Migeon
Home |
Main Index |
Thread Index |
Old Index