LWN: Comments on "OpenSSH 6.2 released"
http://lwn.net/Articles/543961/
This is a special feed containing comments posted
to the individual LWN article titled "OpenSSH 6.2 released".
hourly2OpenSSH 6.2 released
http://lwn.net/Articles/545663/rss
2013-04-03T04:47:55+00:00sitaram
<div class="FormattedComment">
It would be even more awesome if it would add the fingerprint of the incoming public key, along with the username, when calling the external program.<br>
<p>
I admit the use case is very narrow though; I'm speaking as the author of gitolite, where it's not uncommon to see a few hundreds or more pubkeys in one authorized_keys file. The external program could help to cut down the time taken to do the linear scan that sshd currently seems to do when presented with a key.<br>
<p>
(And I checked the protocol; <a href="http://tools.ietf.org/html/rfc4252#section-7">http://tools.ietf.org/html/rfc4252#section-7</a> appears to indicate that some information about the key being offered (it's called "public key blob" in the rfc) *does* go to the ssh server from the ssh client before any authN happens.<br>
</div>
OpenSSH 6.2 released
http://lwn.net/Articles/544368/rss
2013-03-25T18:42:18+00:00dlang
<div class="FormattedComment">
grouping by process does not solve the problem the OP was having with the multiple messages.<br>
<p>
It's pretty trivial to group or split syslog messages by the program name.<br>
<p>
If you're going to say that Journald is better than syslog, you really should compare it against a modern syslog implementation (syslog-ng, rsyslog, nxlog, logstash, etc), not the historic syslog daemon. Every distro I know of except openwrt has converted over to a modern syslog daemin, and even openwrt has syslog-ng as an option.<br>
</div>
OpenSSH 6.2 released
http://lwn.net/Articles/544366/rss
2013-03-25T18:38:11+00:00Cyberax
<div class="FormattedComment">
Because it can group messages by process. So it makes extraction much easier, compared to the usual syslog files that can have interleaved messages.<br>
</div>
OpenSSH 6.2 released
http://lwn.net/Articles/544364/rss
2013-03-25T18:35:53+00:00dlang
<div class="FormattedComment">
how does it know what messages it should group together?<br>
<p>
If you are talking about having to do custom configurations to group the messages together, tools exist that can do this with syslog messages as well.<br>
</div>
OpenSSH 6.2 released
http://lwn.net/Articles/544363/rss
2013-03-25T18:26:11+00:00Cyberax
<div class="FormattedComment">
It can group several messages together.<br>
</div>
OpenSSH 6.2 released
http://lwn.net/Articles/544362/rss
2013-03-25T17:56:12+00:00dlang
<div class="FormattedComment">
exactly how does journald solve this problem?<br>
<p>
The problem is that the application is putting information into multiple log entries that the consumer (the log analysis tools) would really rather be in one log entry.<br>
<p>
I don't see how any logging system can possibly solve this application problem?<br>
</div>
OpenSSH 6.2 released
http://lwn.net/Articles/544329/rss
2013-03-25T15:24:03+00:00niner
<div class="FormattedComment">
I just can't understand why people argued so much against journald which solves problems like this very neatly.<br>
</div>
OpenSSH 6.2 released
http://lwn.net/Articles/544303/rss
2013-03-25T10:02:22+00:00gebi
<div class="FormattedComment">
<a href="https://bugzilla.mindrot.org/show_bug.cgi?id=2082">https://bugzilla.mindrot.org/show_bug.cgi?id=2082</a><br>
</div>
OpenSSH 6.2 released
http://lwn.net/Articles/544223/rss
2013-03-24T10:55:16+00:00gdt
<div class="FormattedComment">
Just as importantly multiple methods give a simple defence against SSH door knocking.<br>
</div>
OpenSSH 6.2 released
http://lwn.net/Articles/544137/rss
2013-03-23T15:07:27+00:00gebi
<div class="FormattedComment">
Especially the "This makes "everything on one line" slightly more complex (but of course, not impossible)." (for multi factor auth)<br>
<p>
Yes, it makes useful log analysis much more complex for every other software, and most parsers just do it wrong.<br>
<p>
ONE single line for either success or failure of login would be really nice. Especially pam session setup problems give strange loglines (success login, but a short connection terminated on the client).<br>
<p>
yes, bugreport is on the way ;)<br>
</div>
OpenSSH 6.2 released
http://lwn.net/Articles/544135/rss
2013-03-23T14:56:45+00:00dkg
Note that one of the new features is that you can require more than one authentication/authorization mechanism to grant access. This makes "everything on one line" slightly more complex (but of course, not impossible).
<p>
I don't see the ticket at <a href="https://bugzilla.mindrot.org/">the OpenSSH bugtracker</a> yet. If you want this improvement to happen, could you please post the suggestion <a href="https://bugzilla.mindrot.org/">there</a>? Thanks! Suggesting improvements in the right place is a great way to contribute to free software.
OpenSSH 6.2 released
http://lwn.net/Articles/544131/rss
2013-03-23T14:42:30+00:00gebi
<div class="FormattedComment">
YES, exactly this!<br>
Having to do correlation in logfiles is not nice!<br>
<p>
Ideally we'd have a log line saying that ssh not only accepted a public key, but everything (including pam session setup) was successfull and after that produce a log line that the user logged in eg. with this 'public key'.<br>
<p>
But for the beginning just adding the ssh key fingerprint in the Accepted public-key line would be fine!<br>
</div>
OpenSSH 6.2 released - thoughts for larger systems
http://lwn.net/Articles/544092/rss
2013-03-23T04:33:31+00:00pabs
<div class="FormattedComment">
Another approach for your last paragraph is to use the OpenPGP web of trust, then you aren't relying on any central authority for your security. The Monkeysphere Project maps the OpenPGP web of trust onto SSH (and the web):<br>
<p>
<a href="http://web.monkeysphere.info/">http://web.monkeysphere.info/</a><br>
</div>
OpenSSH 6.2 released
http://lwn.net/Articles/544081/rss
2013-03-23T02:22:42+00:00laptop006
<div class="FormattedComment">
" * ssh(1): Added ~v and ~V escape sequences to raise and lower the<br>
logging level respectively.<br>
<p>
* ssh(1): Made the escape command help (~?) context sensitive so that<br>
only commands that will work in the current session are shown."<br>
<p>
Thanks for these, both will be really handy, SSH's escape sequences are something more people really should know about.<br>
</div>
OpenSSH 6.2 released
http://lwn.net/Articles/544080/rss
2013-03-23T02:21:31+00:00laptop006
<div class="FormattedComment">
We had a nice patch for this at $JOB[-1], it's nice where multiple people share a single account (some sysadmins for example on systems where LDAP etc. aren't possible), ours added keyid to the "Accepted publickey" line which meant no need to do correlation.<br>
<p>
We stopped using it in ~2009 when it was noticed that we weren't keeping up with SSH security patches.<br>
</div>
OpenSSH 6.2 released - thoughts for larger systems
http://lwn.net/Articles/544049/rss
2013-03-22T21:57:11+00:00tialaramex
<div class="FormattedComment">
Prior to this official OpenSSH does a great job for small systems, but it does get troublesome to manage it securely as a system grows, as the number of people using it grows, or both together. You either resort to password authentication (because you can centrally manage that) and lose the benefit of public key auth, or you end up maintaining some Heath Robinson scripts to update authorized_keys files everywhere and either way you can't really do multi-factor cleanly. As OpenSSH 6.2 (or backports of these now official patches) lands in more places that problem goes away.<br>
<p>
AuthorizedKeysCommand plus AuthenticationMethods offers a future where redundant, SSL-secured LDAP servers maintain the public key list and password hashes for all your users, and you need both to log in. So you have multi-factor, plus you get to enforce password policy (length of password, frequency of change) and you get to easily administrate all this centrally.<br>
<p>
And if you want to make your life _really_ easy, get DNSSEC (at least within your own networks) and use the support for DNS-based host key verification, which eliminates the need to maintain known_hosts files or (the reality in too many systems) do blind trust on first usage.<br>
</div>
OpenSSH 6.2 released
http://lwn.net/Articles/544017/rss
2013-03-22T18:55:35+00:00dkg
sshd logs the fingerprint of the public key when "LogLevel VERBOSE" is set in sshd_config:
<pre>
Mar 22 14:51:45 remotehost sshd[14277]: Found matching RSA key: 89:dd:09:d8:1a:25:8e:0e::71:f4:0c:a4:1e:fe:e0:1c
Mar 22 14:51:45 remotehost sshd[14277]: Accepted publickey for abc123 from 127.0.0.1 port 35514 ssh2
Mar 22 14:51:45 remotehost sshd[14277]: pam_unix(sshd:session): session opened for user abc123 by (uid=0)
</pre>
why is that useless for log analysis?
<p>If there's a specific change that would make this sort of logging more useful, please make a feature request <a href="https://bugzilla.mindrot.org/">on the project's bugtracker</a> so that we can all share in the improvement :)
OpenSSH 6.2 released
http://lwn.net/Articles/544007/rss
2013-03-22T18:17:56+00:00aba
<div class="FormattedComment">
It does. I'm using the relevant patch from bugzilla for some time with exactly this scenario (ssh key + OTP).<br>
</div>
OpenSSH 6.2 released
http://lwn.net/Articles/544004/rss
2013-03-22T18:09:32+00:00gebi
<div class="FormattedComment">
Uh sorry for not being clear, i really meant "log the key-id on the server side".<br>
<p>
Yes i does that at some debug level, though that is useless for log analysis...<br>
<p>
<p>
</div>
OpenSSH 6.2 released
http://lwn.net/Articles/544003/rss
2013-03-22T18:04:51+00:00dkg
gebi wrote:
<blockquote>
> It would be awesome if ssh could print the ssh "key-id" of the key which authenticated for the current session.
</blockquote>
It does, at debug level2. So "ssh -vv remotehost" should give you some spew like:
<pre>
debug1: Authentications that can continue: publickey
debug1: Next authentication method: publickey
debug1: Offering RSA public key: id_rsa
debug2: we sent a publickey packet, wait for reply
debug1: Server accepts key: pkalg ssh-rsa blen 279
debug2: input_userauth_pk_ok: fp :89:dd:09:d8:1a:25:8e:0e::71:f4:0c:a4:1e:fe:e0:1c
debug1: Authentication succeeded (publickey).
</pre>
OpenSSH 6.2 released
http://lwn.net/Articles/543995/rss
2013-03-22T17:04:17+00:00gebi
<div class="FormattedComment">
It would be awesome if ssh could print the ssh "key-id" of the key which authenticated for the current session.<br>
</div>
OpenSSH 6.2 released
http://lwn.net/Articles/543988/rss
2013-03-22T16:47:59+00:00marineam
<div class="FormattedComment">
Yup, and each can be secured differently (phone pin, key password, etc) so in most cases that should be good enough and you get to use brain cells for remembering memes instead of passwords.<br>
</div>
OpenSSH 6.2 released
http://lwn.net/Articles/543987/rss
2013-03-22T16:36:52+00:00yokem_55
<div class="FormattedComment">
The exact same thought came to my mind. Public key + Google's H/TOTP auth would be really nice to have setup. Granted, it's doubling up on the "things you have" auth mode, but this way the "things" can be on separate devices (key on system, H/TOTP app on phone).<br>
<p>
Looking forward to playing with this.<br>
</div>
OpenSSH 6.2 released
http://lwn.net/Articles/543985/rss
2013-03-22T16:28:33+00:00marineam
<div class="FormattedComment">
Oh, requiring multiple auth methods should make key+OTP workable.<br>
</div>