| Summary: | Make it possible to give a give an ssh session only access to a limit subset of ssh-agent keys | ||||||
|---|---|---|---|---|---|---|---|
| Product: | Portable OpenSSH | Reporter: | Alain Knaff <mindrot2> | ||||
| Component: | ssh | Assignee: | Damien Miller <djm> | ||||
| Status: | NEW --- | ||||||
| Severity: | enhancement | CC: | chrysn, daniel, djm, dtucker, jasper, mindrot | ||||
| Priority: | P2 | ||||||
| Version: | 5.8p1 | ||||||
| Hardware: | All | ||||||
| OS: | All | ||||||
| See Also: | https://bugzilla.mindrot.org/show_bug.cgi?id=2216 | ||||||
| Attachments: |
|
||||||
|
Description
Alain Knaff
2011-09-12 05:44:15 AEST
Alex could also use ssh-add -c when loading the key to require confirmation at the time of use. Two problems with this work-around: 1. What if Alex started a long-running script needing ssh access, and went for a coffee? 2. The askpass prompt doesn't actually say which session requested access to the key. So an attacker could still abuse keys not intended for him by just timing his request right. the ssh-agent-filter program[1] would make the workaround you suggested yourself (start multiple ssh-agents, and tweak the SSH_AUTH_SOCK environment variable manually) a little less cumbersome, as only one real agent would be involved. if bug #2216 was solved, would those two things constitute a viable solution for this bug? [1] https://github.com/tiwe-de/ssh-agent-filter Looks like this is implemented with IdentitiesOnly I agree; moreover, the bug #2216 I linked in my last comment is immaterial to this particular use case. Created attachment 3087 [details]
prefer to forward SSH_AUTH_SOCK_FORWARD if present
This makes ssh prefer to forward the agent socket pointed to by $SSH_AUTH_SOCK_FORWARD if it is set. If it is not set, then SSH_AUTH_SOCK is used as usual.
Move to OpenSSH 7.8 tracking bug There are other proposals for agent filtering, including https://github.com/StanfordSNR/guardian-agent and others. Removing release target until we have a better plan. |