I've been wondering about the 'sshd1 -i' option for calling from
 inetd and specifically the man page reference to the lengthy key
 generation process:
 
        -i     Specifies  that sshd is being run from inetd.  Sshd
               is normally not run from inetd because it needs to
               generate  the  server  key before it can respond to
               the client, and this  may  take  tens  of  seconds.
               Clients  would have to wait too long if the key was
               regenerated every time.  However,  with  small  key
               sizes (e.g.  512) using sshd from inetd may be feas
               sible.
 
 A co-worker of mine tells me that he likes to run it from inetd because of
 the added security of having a key generated each time. 
 
 Personally, I can't stand inetd and avoid it at all costs -- being a fan
 of qmail, if I really had to run sshd1 -i then I would wrap it under
 tcpserver and live with that. My hunch though is that generating the key
 too often is actually a bad thing when you consider that most computers
 don't have a good source of randomness. So generating keys too often will
 actually help the attacker. Is that correct?
 
 Comments appreciated. Are both issues (key generation and inetd/tcpserver)
 moot points / insignificant? And the ability for sshd as a daemon on its
 own to gracefully defer connections if there are too many, which I imagine
 it does, plus any other issues there may be. Thanks.
 
 Bottom of this page describes tcpserver vs inetd:
 
         http://cr.yp.to/ucspi-tcp.html
 

Reply via email to