Bug#804818: Improved interplay between StrictHostKeyChecking and VerifyHostKeyDNS

2015-11-12 Thread Christoph Anton Mitterer
On Thu, 2015-11-12 at 19:21 +1300, martin f krafft wrote: > also sprach Christoph Anton Mitterer [2015- > 11-12 17:41 +1300]: > > > Hopeful, I was looking at VerifyHostKeyDNS for relief > > The default StrictHostKeyChecking isn't secure enough for you, but > > you'd trust DNSSEC here? ;-P > Why sh

Bug#804818: Improved interplay between StrictHostKeyChecking and VerifyHostKeyDNS

2015-11-11 Thread martin f krafft
also sprach Christoph Anton Mitterer [2015-11-12 17:41 +1300]: > > Hopeful, I was looking at VerifyHostKeyDNS for relief > The default StrictHostKeyChecking isn't secure enough for you, but > you'd trust DNSSEC here? ;-P Why should I not trust DNSSEC for hosts where I control the zone? -- .''

Bug#804818: Improved interplay between StrictHostKeyChecking and VerifyHostKeyDNS

2015-11-11 Thread Christoph Anton Mitterer
On Thu, 2015-11-12 at 16:48 +1300, martin f krafft wrote: > I am one of those people that think that StrictHostKeyChecking=yes > should be on by default for its security benefit agreed > Hopeful, I was looking at VerifyHostKeyDNS for relief The default StrictHostKeyChecking isn't secure enough for

Bug#804818: Improved interplay between StrictHostKeyChecking and VerifyHostKeyDNS

2015-11-11 Thread martin f krafft
Package: openssh-client Version: 1:6.9p1-2+b1 Severity: wishlist File: /usr/bin/ssh I am one of those people that think that StrictHostKeyChecking=yes should be on by default for its security benefit, but obviously it's a pain to connect to new nodes with this option turned on. Hopeful, I was loo