⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 draft-ietf-secsh-dns-05.txt

📁 bind 9.3结合mysql数据库
💻 TXT
📖 第 1 页 / 共 2 页
字号:
   DNS zone administrator (in transferring the fingerprint), detailed   aspects of how verification is done in the SSH implementation, and in   the client's diligence in accessing the DNS in a secure manner.   One such aspect is in which order fingerprints are looked up (e.g.   first checking local file and then SSHFP).  We note that in addition   to protecting the first-time transfer of host keys, SSHFP can   optionally be used for stronger host key protection.      If SSHFP is checked first, new SSH host keys may be distributed by      replacing the corresponding SSHFP in DNS.      If SSH host key verification can be configured to require SSHFP,      SSH host key revocation can be implemented by removing the      corresponding SSHFP from DNS.   As stated in Section 2.2, we recommend that SSH implementors provide   a policy mechanism to control the order of methods used for host key   verification. One specific scenario for having a configurable policy   is where clients use unqualified host names to connect to servers. In   this case, we recommend that SSH implementations check the host keySchlyter & Griffin       Expires March 5, 2004                  [Page 6]Internet-Draft          DNS and SSH Fingerprints          September 2003   against a local database before verifying the key via the fingerprint   returned from DNS. This would help prevent an attacker from injecting   a DNS search path into the local resolver and forcing the client to   connect to a different host.   A different approach to solve the DNS search path issue would be for   clients to use a trusted DNS search path, i.e., one not acquired   through DHCP or other autoconfiguration mechanisms. Since there is no   way with current DNS lookup APIs to tell whether a search path is   from a trusted source, the entire client system would need to be   configured with this trusted DNS search path.   Another dependency is on the implementation of DNSSEC itself.  As   stated in Section 2.4, we mandate the use of secure methods for   lookup and that SSHFP RRs are authenticated by trusted SIG RRs.  This   is especially important if SSHFP is to be used as a basis for host   key rollover and/or revocation, as described above.   Since DNSSEC only protects the integrity of the host key fingerprint   after it is signed by the DNS zone administrator, the fingerprint   must be transferred securely from the SSH host administrator to the   DNS zone administrator.  This could be done manually between the   administrators or automatically using secure DNS dynamic update [11]   between the SSH server and the nameserver.  We note that this is no   different from other key enrollment situations, e.g. a client sending   a certificate request to a certificate authority for signing.5. IANA Considerations   IANA needs to allocate a RR type code for SSHFP from the standard RR   type space (type 44 requested).   IANA needs to open a new registry for the SSHFP RR type for public   key algorithms.  Defined types are:         0 is reserved         1 is RSA         2 is DSA    Adding new reservations requires IETF consensus [4].   IANA needs to open a new registry for the SSHFP RR type for   fingerprint types.  Defined types are:         0 is reserved         1 is SHA-1    Adding new reservations requires IETF consensus [4].Schlyter & Griffin       Expires March 5, 2004                  [Page 7]Internet-Draft          DNS and SSH Fingerprints          September 2003Normative References   [1]  Mockapetris, P., "Domain names - concepts and facilities", STD        13, RFC 1034, November 1987.   [2]  Mockapetris, P., "Domain names - implementation and        specification", STD 13, RFC 1035, November 1987.   [3]  Bradner, S., "Key words for use in RFCs to Indicate Requirement        Levels", BCP 14, RFC 2119, March 1997.   [4]  Narten, T. and H. Alvestrand, "Guidelines for Writing an IANA        Considerations Section in RFCs", BCP 26, RFC 2434, October 1998.   [5]  Eastlake, D., "Domain Name System Security Extensions", RFC        2535, March 1999.   [6]  Ylonen, T., Kivinen, T., Saarinen, M., Rinne, T. and S.        Lehtinen, "SSH Protocol Architecture",        draft-ietf-secsh-architecture-14 (work in progress), July 2003.   [7]  Ylonen, T., Kivinen, T., Saarinen, M., Rinne, T. and S.        Lehtinen, "SSH Transport Layer Protocol",        draft-ietf-secsh-transport-16 (work in progress), July 2003.Informational References   [8]   Thayer, R., Doraswamy, N. and R. Glenn, "IP Security Document         Roadmap", RFC 2411, November 1998.   [9]   Vixie, P., Gudmundsson, O., Eastlake, D. and B. Wellington,         "Secret Key Transaction Authentication for DNS (TSIG)", RFC         2845, May 2000.   [10]  Eastlake, D., "DNS Request and Transaction Signatures (         SIG(0)s)", RFC 2931, September 2000.   [11]  Wellington, B., "Secure Domain Name System (DNS) Dynamic         Update", RFC 3007, November 2000.Schlyter & Griffin       Expires March 5, 2004                  [Page 8]Internet-Draft          DNS and SSH Fingerprints          September 2003Authors' Addresses   Jakob Schlyter   OpenSSH   812 23rd Avenue SE   Calgary, Alberta  T2G 1N8   Canada   EMail: jakob@openssh.com   URI:   http://www.openssh.com/   Wesley Griffin   SPARTA   7075 Samuel Morse Drive   Columbia, MD  21046   USA   EMail: wgriffin@sparta.com   URI:   http://www.sparta.com/Appendix A. Acknowledgements   The authors gratefully acknowledge, in no particular order, the   contributions of the following persons:      Martin Fredriksson      Olafur Gudmundsson      Edward Lewis      Bill SommerfeldSchlyter & Griffin       Expires March 5, 2004                  [Page 9]Internet-Draft          DNS and SSH Fingerprints          September 2003Intellectual Property Statement   The IETF takes no position regarding the validity or scope of any   intellectual property or other rights that might be claimed to   pertain to the implementation or use of the technology described in   this document or the extent to which any license under such rights   might or might not be available; neither does it represent that it   has made any effort to identify any such rights. Information on the   IETF's procedures with respect to rights in standards-track and   standards-related documentation can be found in BCP-11. Copies of   claims of rights made available for publication and any assurances of   licenses to be made available, or the result of an attempt made to   obtain a general license or permission for the use of such   proprietary rights by implementors or users of this specification can   be obtained from the IETF Secretariat.   The IETF invites any interested party to bring to its attention any   copyrights, patents or patent applications, or other proprietary   rights which may cover technology that may be required to practice   this standard. Please address the information to the IETF Executive   Director.Full Copyright Statement   Copyright (C) The Internet Society (2003). All Rights Reserved.   This document and translations of it may be copied and furnished to   others, and derivative works that comment on or otherwise explain it   or assist in its implementation may be prepared, copied, published   and distributed, in whole or in part, without restriction of any   kind, provided that the above copyright notice and this paragraph are   included on all such copies and derivative works. However, this   document itself may not be modified in any way, such as by removing   the copyright notice or references to the Internet Society or other   Internet organizations, except as needed for the purpose of   developing Internet standards in which case the procedures for   copyrights defined in the Internet Standards process must be   followed, or as required to translate it into languages other than   English.   The limited permissions granted above are perpetual and will not be   revoked by the Internet Society or its successors or assignees.   This document and the information contained herein is provided on an   "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING   TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING   BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATIONSchlyter & Griffin       Expires March 5, 2004                 [Page 10]Internet-Draft          DNS and SSH Fingerprints          September 2003   HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF   MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.Acknowledgement   Funding for the RFC Editor function is currently provided by the   Internet Society.Schlyter & Griffin       Expires March 5, 2004                 [Page 11]

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -