https://bugzilla.mindrot.org/show_bug.cgi?id=3155

            Bug ID: 3155
           Summary: openssh support hostkey encrypt
           Product: Portable OpenSSH
           Version: 8.2p1
          Hardware: ARM64
                OS: Linux
            Status: NEW
          Severity: security
          Priority: P5
         Component: ssh-keygen
          Assignee: [email protected]
          Reporter: [email protected]

We noticed that the sshd.c file contained such a code snippet:
...
        for (i = 0; i < options.num_host_key_files; i++) {
                int ll = options.host_key_file_userprovided[i] ?
                    SYSLOG_LEVEL_ERROR : SYSLOG_LEVEL_DEBUG1;

                if (options.host_key_files[i] == NULL)
                        continue;
                if ((r = sshkey_load_private(options.host_key_files[i],
"",
                    &key, NULL)) != 0 && r != SSH_ERR_SYSTEM_ERROR)
                        do_log2(ll, "Unable to load host key \"%s\":
%s",
                            options.host_key_files[i], ssh_err(r));
...
By default, an empty string is used as the password for reading the
hostkey. When the hostkey is stolen, the third party can disguise as
the server to obtain some information about the SSH client. We want to
protect it by encrypting the hostkey. 

Can we use a non-empty string to encrypt the hostkey?

-- 
You are receiving this mail because:
You are watching the assignee of the bug.
_______________________________________________
openssh-bugs mailing list
[email protected]
https://lists.mindrot.org/mailman/listinfo/openssh-bugs

Reply via email to