Re: question about pubkey and passphrase

[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

 



On 02/10/2020 03:10 PM, Harald Dunkel wrote:
> Since Docker can bind-mount every .ssh directory I am looking for
> some way to forbid unprotected private keys.

... why aren't you worried about Docker on the *servers* stealing the
(necessarily passphrase-less) *host* privkeys if it can really grab
whatever it likes? Or *TONS* of data it shouldn't have access to, if the
server runs anything perpendicular to that one Docker container's
purpose ...

> AFAICS it is currently not possible on the sshd to verify that
> the peer's private key was protected by a passphrase. Can you
> confirm?

In the general case, the client connecting may have the privkey in the
standard location, elsewhere (-i option), pre-loaded into ssh-agent,
stored in a file with a *different* format (e.g., PuTTY instead of
OpenSSH), etcetera.

In particular in the case of ssh-agent, the software doing the
authentication (ssh-agent, ssh, and sshd) has no information about the
*file* the privkey originally came from (as that was handled by
ssh-add), much less whether that one was protected at that time, or
still is now.

*If* you have enough control over the clients to run a file scan on
*them* and have the result reported back to you every now and then, you
could try to permanently invalidate "offending" privkeys by distributing
a collection of the corresponding pubkeys to your servers and pointing
sshd at it with the RevokedKeys config.

(Note, however, that offhand, I cannot find a command that allows you to
derive a pubkey from a privkey, or confirm that a given pubkey
corresponds to some (even nonencrypted) privkey. Think "evil user makes
a dozen copies of some newly created, unencrypted privkey, adds the
sysadmins' pubkeys in files with corresponding filenames, and waits for
your next scan".)

Kind regards,
-- 
Jochen Bern
Systemingenieur

Binect GmbH

Attachment: smime.p7s
Description: S/MIME Cryptographic Signature

_______________________________________________
openssh-unix-dev mailing list
openssh-unix-dev@xxxxxxxxxxx
https://lists.mindrot.org/mailman/listinfo/openssh-unix-dev

[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

[Index of Archives]     [Linux ARM Kernel]     [Linux ARM]     [Linux Omap]     [Fedora ARM]     [IETF Annouce]     [Security]     [Bugtraq]     [Linux]     [Linux OMAP]     [Linux MIPS]     [ECOS]     [Asterisk Internet PBX]     [Linux API]

  Powered by Linux