| Summary: | ssh client shouldn't trust the DNS AD bit blindly | ||
|---|---|---|---|
| Product: | Portable OpenSSH | Reporter: | scott-mindrot |
| Component: | ssh | Assignee: | Assigned to nobody <unassigned-bugs> |
| Status: | CLOSED WONTFIX | ||
| Severity: | security | CC: | djm |
| Priority: | P5 | ||
| Version: | 7.1p1 | ||
| Hardware: | All | ||
| OS: | All | ||
|
Description
scott-mindrot
2015-12-12 04:41:01 AEDT
That RFC advice is irrelevant to OpenSSH because OpenSSH isn't a resolver. OpenSSH talks to a resolver via libc interfaces (or optionally ldns) and its up to the resolver in use to determine the trustworthyness of AD. The ssh process, (through libresolv, libldns or whatever), is processing a DNS packet from an untrusted third party resolver (it sends and receives DNS packets directly with the resolv.conf server, eg coffee shop router)... not sure who else is supposed to decide that the AD bit is untrusted at that point? Like I said, it's up to the resolver code. OpenSSH doesn't implement name resolution. We couldn't implement this even if we wanted to*, as the libc resolver doesn't expose the AD information to its callers. * short of implementing a full resolver in OpenSSH, which isn't going to happen. Close all resolved bugs after 7.3p1 release |