IETF-SSH archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
Re: secsh-sftp-scp-uri draft
Hello,
My few cents:
On Wed, 20 Aug 2003, Steve Suehring wrote:
> 1.  Default port issue
> 
> Status:  Proposed change- "If the port is not included, the default port 
> (22) is assumed."
Sounds reasonable.
> 2.  Specifying ciphers etc as parameters
I fail to see the need for these. Client already has a list of preferred 
algorithms and server can dictate use of a specific cipher as the drafts 
stand.
Only place I can find this useful is when server wants to use a cipher not 
allowed by the default client policy (say, des or none). I'd be 
very wary allowing such action.
Educate me, if I've missed something.
[snip]
> 
> 4.  Multiple host key algorithms and fingerprints
I'd like to see fingerprints removed from the draft. I think it's calling 
for trouble in a way of man-in-the-middle or impersonation attacks.
> 5.  Security considerations in trusted vs. untrusted URLS
Is there such a thing as trusted URL? I doubt it. Maybe the source can be 
verified, but there's no validity protection on the URL itself. Consider 
someone being able to post content on a trusted site. Or an attacker 
tricking some trusted user to send crafted URL in e-mail. An employee gone 
bad and sending a malicious URL.
It's hard to get it right, and in my opinion, the risks far outweigh the 
benefits (maybe some anonymous SFTP scheme?).
My suggestion:
Let the SSH/SCP/SFTP URIs be location pointers, and remove connection 
parameters altogether. Treat all URIs as 'untrusted' and let SSH handle
the decissions over connection setup.
 Best regards,
  Heikki Nousiainen 
Home |
Main Index |
Thread Index |
Old Index