diff options
author | Damien Miller <djm@mindrot.org> | 2006-01-31 21:46:51 +1100 |
---|---|---|
committer | Damien Miller <djm@mindrot.org> | 2006-01-31 21:46:51 +1100 |
commit | bbc59094b95aee8456918c35a8138179d34008a1 (patch) | |
tree | 30b3085e7ee7e0ccca22ebe5664d3f2020545250 | |
parent | 7602cba59d11822c51346b44c043a39ef2fe608a (diff) |
- jmc@cvs.openbsd.org 2006/01/26 08:47:56
[ssh.1]
add a section on verifying host keys in dns;
written with a lot of help from jakob;
feedback dtucker/markus;
ok markus
-rw-r--r-- | ChangeLog | 8 | ||||
-rw-r--r-- | ssh.1 | 61 |
2 files changed, 58 insertions, 11 deletions
@@ -12,6 +12,12 @@ | |||
12 | - jmc@cvs.openbsd.org 2006/01/25 09:07:22 | 12 | - jmc@cvs.openbsd.org 2006/01/25 09:07:22 |
13 | [sshd.8] | 13 | [sshd.8] |
14 | move subsections to full sections; | 14 | move subsections to full sections; |
15 | - jmc@cvs.openbsd.org 2006/01/26 08:47:56 | ||
16 | [ssh.1] | ||
17 | add a section on verifying host keys in dns; | ||
18 | written with a lot of help from jakob; | ||
19 | feedback dtucker/markus; | ||
20 | ok markus | ||
15 | 21 | ||
16 | 20060129 | 22 | 20060129 |
17 | - (dtucker) [configure.ac opensshd.init.in] Bug #1144: Use /bin/sh for the | 23 | - (dtucker) [configure.ac opensshd.init.in] Bug #1144: Use /bin/sh for the |
@@ -3737,4 +3743,4 @@ | |||
3737 | - (djm) Trim deprecated options from INSTALL. Mention UsePAM | 3743 | - (djm) Trim deprecated options from INSTALL. Mention UsePAM |
3738 | - (djm) Fix quote handling in sftp; Patch from admorten AT umich.edu | 3744 | - (djm) Fix quote handling in sftp; Patch from admorten AT umich.edu |
3739 | 3745 | ||
3740 | $Id: ChangeLog,v 1.4097 2006/01/31 10:46:20 djm Exp $ | 3746 | $Id: ChangeLog,v 1.4098 2006/01/31 10:46:51 djm Exp $ |
@@ -34,7 +34,7 @@ | |||
34 | .\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF | 34 | .\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF |
35 | .\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. | 35 | .\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
36 | .\" | 36 | .\" |
37 | .\" $OpenBSD: ssh.1,v 1.251 2006/01/20 00:14:55 dtucker Exp $ | 37 | .\" $OpenBSD: ssh.1,v 1.252 2006/01/26 08:47:56 jmc Exp $ |
38 | .Dd September 25, 1999 | 38 | .Dd September 25, 1999 |
39 | .Dt SSH 1 | 39 | .Dt SSH 1 |
40 | .Os | 40 | .Os |
@@ -810,15 +810,6 @@ The | |||
810 | option can be used to control logins to machines whose | 810 | option can be used to control logins to machines whose |
811 | host key is not known or has changed. | 811 | host key is not known or has changed. |
812 | .Pp | 812 | .Pp |
813 | .Nm | ||
814 | can be configured to verify host identification using fingerprint resource | ||
815 | records (SSHFP) published in DNS. | ||
816 | The | ||
817 | .Cm VerifyHostKeyDNS | ||
818 | option can be used to control how DNS lookups are performed. | ||
819 | SSHFP resource records can be generated using | ||
820 | .Xr ssh-keygen 1 . | ||
821 | .Pp | ||
822 | When the user's identity has been accepted by the server, the server | 813 | When the user's identity has been accepted by the server, the server |
823 | either executes the given command, or logs into the machine and gives | 814 | either executes the given command, or logs into the machine and gives |
824 | the user a normal shell on the remote machine. | 815 | the user a normal shell on the remote machine. |
@@ -1006,6 +997,56 @@ and | |||
1006 | options above) and | 997 | options above) and |
1007 | the user is using an authentication agent, the connection to the agent | 998 | the user is using an authentication agent, the connection to the agent |
1008 | is automatically forwarded to the remote side. | 999 | is automatically forwarded to the remote side. |
1000 | .Sh VERIFYING HOST KEYS | ||
1001 | When connecting to a server for the first time, | ||
1002 | a fingerprint of the server's public key is presented to the user | ||
1003 | (unless the option | ||
1004 | .Cm StrictHostKeyChecking | ||
1005 | has been disabled). | ||
1006 | Fingerprints can be determined using | ||
1007 | .Xr ssh-keygen 1 : | ||
1008 | .Pp | ||
1009 | .Dl $ ssh-keygen -l -f /etc/ssh/ssh_host_rsa_key | ||
1010 | .Pp | ||
1011 | If the fingerprint is already known, | ||
1012 | it can be matched and verified, | ||
1013 | and the key can be accepted. | ||
1014 | If the fingerprint is unknown, | ||
1015 | an alternative method of verification is available: | ||
1016 | SSH fingerprints verified by DNS. | ||
1017 | An additional resource record (RR), | ||
1018 | SSHFP, | ||
1019 | is added to a zonefile | ||
1020 | and the connecting client is able to match the fingerprint | ||
1021 | with that of the key presented. | ||
1022 | .Pp | ||
1023 | In this example, we are connecting a client to a server, | ||
1024 | .Dq host.example.com . | ||
1025 | The SSHFP resource records should first be added to the zonefile for | ||
1026 | host.example.com: | ||
1027 | .Bd -literal -offset indent | ||
1028 | $ ssh-keygen -f /etc/ssh/ssh_host_rsa_key.pub -r host.example.com. | ||
1029 | $ ssh-keygen -f /etc/ssh/ssh_host_dsa_key.pub -r host.example.com. | ||
1030 | .Ed | ||
1031 | .Pp | ||
1032 | The output lines will have to be added to the zonefile. | ||
1033 | To check that the zone is answering fingerprint queries: | ||
1034 | .Pp | ||
1035 | .Dl $ dig -t SSHFP host.example.com | ||
1036 | .Pp | ||
1037 | Finally the client connects: | ||
1038 | .Bd -literal -offset indent | ||
1039 | $ ssh -o "VerifyHostKeyDNS ask" host.example.com | ||
1040 | [...] | ||
1041 | Matching host key fingerprint found in DNS. | ||
1042 | Are you sure you want to continue connecting (yes/no)? | ||
1043 | .Ed | ||
1044 | .Pp | ||
1045 | See the | ||
1046 | .Cm VerifyHostKeyDNS | ||
1047 | option in | ||
1048 | .Xr ssh_config 5 | ||
1049 | for more information. | ||
1009 | .Sh SSH-BASED VIRTUAL PRIVATE NETWORKS | 1050 | .Sh SSH-BASED VIRTUAL PRIVATE NETWORKS |
1010 | .Nm | 1051 | .Nm |
1011 | contains support for Virtual Private Network (VPN) tunnelling | 1052 | contains support for Virtual Private Network (VPN) tunnelling |