bugzilla-daemon at mindrot.org
2014-Nov-07 23:38 UTC
[Bug 2309] New: change default PreferredAuthentications order
https://bugzilla.mindrot.org/show_bug.cgi?id=2309 Bug ID: 2309 Summary: change default PreferredAuthentications order Product: Portable OpenSSH Version: 6.7p1 Hardware: Other OS: All Status: NEW Severity: enhancement Priority: P5 Component: ssh Assignee: unassigned-bugs at mindrot.org Reporter: calestyo at scientia.net Hi. As far as I understand, one cannot "improve" the security of SSH by disabling auth methods or changing their order... on the client side(!). - Even if one thinks e.g. password or hostbased are insecure, as long as they're enabled on the server side, one cannot "protect" such server by disabling it on the client side. - Neither can one improve the security of the one's own current session, since that is already fully set up after the KEX (both plain KEX or GSS KEX) and thus *before* auth takes places. Right so far? If so, then the only sense of the default order of auth methods is probably usability, i.e. the less interaction necessary by the user, the better. The current default is: gssapi-with-mic,hostbased,publickey,keyboard-interactive,password Which is IMHO already close to perfect: keyboard-interactive,password come last, since they always require manual user input. publickey - may or may not require manual input (depending on whether the identity key is encrypted or not), thus it should be before the two with passphrase entry But then I'd swap gssapi-with-mic with hostbased: gssapi-with-mic: a krb ticket may not be available, if not the user would need create one first likely requires passphrase input as well,... but they ticket may also be already there (thus no further interaction needed) which is why it should come before pubkey hostkey: well AFAIU, it either works (if enabled and ssh-keysign is activated) or not. No interaction for the user. Cheers, Chris. -- You are receiving this mail because: You are watching the assignee of the bug.
bugzilla-daemon at mindrot.org
2014-Nov-08 01:40 UTC
[Bug 2309] change default PreferredAuthentications order
https://bugzilla.mindrot.org/show_bug.cgi?id=2309 Christoph Anton Mitterer <calestyo at scientia.net> changed: What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |RESOLVED Resolution|--- |INVALID --- Comment #1 from Christoph Anton Mitterer <calestyo at scientia.net> --- Rethinking that again (which I probably should have done more carefully before) I'll close this as invalid: Both gssapi-with-mic (and gssapi-keyex) and hostbased won't query the user. - If a kerberos ticket is there, it will be used if gasapi-with-mic comes first and one doesn't need to interact. - If no kerberos ticket is there, gssapi-with-mic auth will fail (respectively not tried at all) and ssh will try hostbased auth. Thus no interaction either. And then I think it's better to prefer the gssapi-* methods over anything else, because if forwarding of credentials is enabled then the user probably wants this, which wouldn't happen if hostbased kicks in before. Sorry for the noise O:-) -- You are receiving this mail because: You are watching the assignee of the bug.
bugzilla-daemon at bugzilla.mindrot.org
2016-Aug-02 00:40 UTC
[Bug 2309] change default PreferredAuthentications order
https://bugzilla.mindrot.org/show_bug.cgi?id=2309 Damien Miller <djm at mindrot.org> changed: What |Removed |Added ---------------------------------------------------------------------------- Status|RESOLVED |CLOSED --- Comment #2 from Damien Miller <djm at mindrot.org> --- Close all resolved bugs after 7.3p1 release -- You are receiving this mail because: You are watching the assignee of the bug.
Reasonably Related Threads
- [Bug 2302] New: ssh (and sshd) should not fall back to deselected KEX algos
- [Bug 2302] New: ssh (and sshd) should not fall back to deselected KEX algos
- [Bug 2573] New: dead sessions cannot be closed with ~.
- [Bug 2287] New: AuthorizedKeysCommandUser should have it's default documented
- [Bug 2209] New: Problem logging into Cisco devices under 6.5p1 (kexgexc.c)