| Summary: | (Feature request) Verify host using key in destination user account | ||
|---|---|---|---|
| Product: | Portable OpenSSH | Reporter: | Eric Postpischil <Eric> |
| Component: | Miscellaneous | Assignee: | Assigned to nobody <unassigned-bugs> |
| Status: | CLOSED WONTFIX | ||
| Severity: | enhancement | CC: | djm |
| Priority: | P5 | ||
| Version: | -current | ||
| Hardware: | All | ||
| OS: | All | ||
|
Description
Eric Postpischil
2016-08-01 04:12:24 AEST
This isn't possible without breaking the guarantees that host key checking is supposed to provide. For the behaviour that you want, ssh would have to ignore a host key verification failure at connection time, proceed with authentication and fetch (presumably using sftp) the host key from the target system. This is a substantial amount of work but, worse, it would require ssh to complete authentication to a system that it does not trust. Completing authentication means sending user credentials to the remote server. This would allow phishing or connection spoofing by hostile servers. The second paragraph in the preceding comment contemplates an implementation in which the ssh client does the work of retrieving the key and verifying it. That is not necessary. When initially contacting the server, the client would supply the name of a user on the server system. The ssh server would read a key from that user’s files and use it in the normal authentication process instead of the usual system host key. closing resolved bugs as of 8.6p1 release |