| Summary: | Please provide a StrictModes-like setting (command line parameter) for ssh (client) | ||
|---|---|---|---|
| Product: | Portable OpenSSH | Reporter: | Sascha Silbe <sascha-openssh-bugs> |
| Component: | ssh | Assignee: | Assigned to nobody <unassigned-bugs> |
| Status: | NEW --- | ||
| Severity: | enhancement | ||
| Priority: | P5 | ||
| Version: | 7.5p1 | ||
| Hardware: | All | ||
| OS: | All | ||
|
Description
Sascha Silbe
2017-05-07 22:41:30 AEST
Since GnuPG 2.1, gpg-agent (in SSH agent emulation mode) doesn't work with password-less keys anymore so our work-around of feeding the private key into ssh-add via stdin stopped working. The refusal of the OpenSSH client to use group-readable private keys is becoming a real pain; we have to stack up work-around upon work-around. How the private key should be protected is a matter of threat model and policy, not a technical matter. It's OK if OpenSSH warns the user about potentially unsafe permissions _by_ _default_, but it should not _force_ users to follow the OpenSSH developer's policy that matches the OpenSSH developer's threat model only. |