I didn't see the original notification go by, so I'll respond to Stefan's 
post.  In short, I agree with Stefan.  :)

  Nits: Section 2.1, I suggest just deleting the mention of a particular 
product.  Everyone knows what a RADIUS server is.  The typical IETF draft 
doesn't mention _any_ product unless it's in the context of what it gets wrong 
(to fix) or right (to standardize)

  I'd echo Stefan's comments about just using EAP, instead of mentioning 
certificates.  The benefits are even more than using certs, as EAP provides for 
many more kinds of authentication types.

  There should be much more detail on exactly how the EAP packets are 
transported in SSH, and how the SSH negotiation decides to use EAP.

  Finally, there should be a discussion of how certificates are managed on the 
SSH client.  There will likely be need for a *separate* certificate store for 
use with SSH, as with 802.1X.  There should be a hard requirement to not trust 
the default root CAs used for web traffic.  Instead, each CA MUST be configured 
separately for use with SSH.

  The draft should also discuss how the client certificate is chosen.  Section 
3.2 has some text, but it is insufficient:

  The SSH client MUST choose a client certificate installed in the
   operating system as described in the section 2.1 Basic Setup.  If
   there are multiple client certificates then the SSH client SHOULD
   choose a client certificate.  If there is no certificate installed on
   the SSH client, then the client MAY choose another authentication
   methods defined in [RFC4251].

  Except Section 2.1 does not say how to choose the client certificate.  And 
the text above repeatedly says "choose", but doesn't say *how*.

  The document also needs to say how the *server* certificate is validated.  
The good news is that SSH can know the hostname of the server it's connecting 
to, unlike 802.1X.  So all of the typical Web checks for "cert matches 
hostname" should apply. and should be discussed here.

  Which then means that the client certificate (if used) should be chosen based 
on the hostname being connected to:  use the "user@hostname" field to find a 
matching client certificate.  Then, verify that the server certificate comes 
from the same root CA, and that the server certificate CN field matches the 
hostname being connected to.

  I suggest referencing RFC 7542 (NAI) for a discussion of "user@hostname" 
issues.

  Over all, I think this proposal is useful.  My team has struggled with the 
exact issues outlined here, when using SSH in a distributed environment.  Being 
able to use EAP would significantly decrease deployment complexity.

  Alan DeKok.

_______________________________________________
OPSAWG mailing list
OPSAWG@ietf.org
https://www.ietf.org/mailman/listinfo/opsawg

Reply via email to