bugzilla-daemon at bugzilla.mindrot.org
2011-Sep-11 19:44 UTC
[Bug 1937] New: Make it possible to give a give an ssh session only access to a limit subset of ssh-agent keys
https://bugzilla.mindrot.org/show_bug.cgi?id=1937
Bug #: 1937
Summary: Make it possible to give a give an ssh session only
access to a limit subset of ssh-agent keys
Classification: Unclassified
Product: Portable OpenSSH
Version: 5.8p1
Platform: All
OS/Version: All
Status: NEW
Severity: enhancement
Priority: P2
Component: ssh
AssignedTo: unassigned-bugs at mindrot.org
ReportedBy: mindrot2 at misc.lka.org.lu
Consider this case:
Alex is sitting at laptop.home , with identity I. He also has a
ssh-agent to which he has ssh-added work.key and linux.key
He has access to kernel.org, and occasionally he wants to transfer
files between kernel.org and linux.org, and thus set up an
authorized_keys file on linux.org that trusts linux.key.
He also has access to work1.nsa.gov, and occasionally he wants to
transfer files between work1.nsa.gov and work2.nsa.gov (for which he
uses work.key)
However, while he trusts kernel.org's admin not to attempt to hack his
way into linux.org, he wouldn't be so sure about him hacking into
work1.nsa.gov, so access to work.key should not be given to linux.org.
Nor would he trust work1.nsa.gov's admin not to attempt to force his
way into kernel.org . So access to linux.key should not be given to
work1.nsa.gov
With the current ssh-agent and agent-forwarding, there's no way in
setting this trust scheme up in a secure way (unless you start multiple
ssh-agents, and tweak the SSH_AUTH_SOCK environment variable manually)
It would be so much easier if we could say (in laptop.home's
~/.ssh/config file):
Host kernel.org.lu
ForwardAgent yes
ForwardAgentAllowKeysOnly linux.key
...
Host work1.nsa.gov
ForwardAgent yes
ForwardAgentAllowKeysOnly work.key
==> if a ForwardAgentAllowKeysOnly line is present, the ssh client
would only forward requests to one of the listed keys to the agent, and
block access attempts to all other keys that the agent may know about,
preventing abuse among different unrelated organizations to which user
may log in.
--
Configure bugmail: https://bugzilla.mindrot.org/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are watching the assignee of the bug.
bugzilla-daemon at bugzilla.mindrot.org
2011-Sep-12 00:29 UTC
[Bug 1937] Make it possible to give a give an ssh session only access to a limit subset of ssh-agent keys
https://bugzilla.mindrot.org/show_bug.cgi?id=1937
Darren Tucker <dtucker at zip.com.au> changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |dtucker at zip.com.au
--- Comment #1 from Darren Tucker <dtucker at zip.com.au> 2011-09-12
10:29:23 EST ---
Alex could also use ssh-add -c when loading the key to require
confirmation at the time of use.
--
Configure bugmail: https://bugzilla.mindrot.org/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are watching the assignee of the bug.
You are watching someone on the CC list of the bug.
bugzilla-daemon at bugzilla.mindrot.org
2011-Sep-12 08:45 UTC
[Bug 1937] Make it possible to give a give an ssh session only access to a limit subset of ssh-agent keys
https://bugzilla.mindrot.org/show_bug.cgi?id=1937 --- Comment #2 from Alain Knaff <mindrot2 at misc.lka.org.lu> 2011-09-12 18:45:21 EST --- Two problems with this work-around: 1. What if Alex started a long-running script needing ssh access, and went for a coffee? 2. The askpass prompt doesn't actually say which session requested access to the key. So an attacker could still abuse keys not intended for him by just timing his request right. -- Configure bugmail: https://bugzilla.mindrot.org/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are watching the assignee of the bug. You are watching someone on the CC list of the bug.
Seemingly Similar Threads
- [Bug 1936] New: -A command not available from ~C
- Equivalent of pxechain.com for (USB key based) syslinux
- [Bug 1937] Make it possible to give a give an ssh session only access to a limit subset of ssh-agent keys
- [Bug 1937] Make it possible to give a give an ssh session only access to a limit subset of ssh-agent keys
- gluster store and autostart - but fails