Bug#618863: /usr/bin/ssh: insecurely verifies host key with VerifyHostKeyDNS option

2015-11-11 Thread martin f krafft
Package: openssh-client Version: 1:6.9p1-2+b1 Followup-For: Bug #618863 It appears that /usr/bin/ssh still does not verify the DNS information properly. What's the status of this issue? What is upstream's take? Has this issue been taken upstream? -- System Information: Debian Release: stretch/sid

Bug#618863: /usr/bin/ssh: insecurely verifies host key with VerifyHostKeyDNS option

2013-07-29 Thread Richard Salts
Package: openssh-client Version: 1:6.0p1-4 Followup-For: Bug #618863 openssh now includes a configure option to link to ldns for verification of the dnssec service rather than relying on the +ad bit in a response for a resolver. Maybe it would be worth adding that to the configuration options on t

Bug#618863: /usr/bin/ssh: insecurely verifies host key with VerifyHostKeyDNS option

2013-01-17 Thread Philipp Kern
On Fri, Mar 18, 2011 at 07:41:36PM -0700, Rob Leslie wrote: > When the VerifyHostKeyDNS option is used, ssh attempts to verify unknown > remote host keys by looking up SSHFP records in DNS. It relies on the AD > (Authentic Data) flag in the response to determine whether the fingerprint > it receive

Bug#618863: /usr/bin/ssh: insecurely verifies host key with VerifyHostKeyDNS option

2011-03-18 Thread Rob Leslie
Package: openssh-client Version: 1:5.5p1-6 Severity: normal File: /usr/bin/ssh Tags: upstream When the VerifyHostKeyDNS option is used, ssh attempts to verify unknown remote host keys by looking up SSHFP records in DNS. It relies on the AD (Authentic Data) flag in the response to determine whether