The SSH protocol is commonly used to access remote systems on the Internet, as it provides an encrypted and authenticated channel for communication. If upon establishing a new connection, the presented server key is unknown to the client, the user is asked to verify the key fingerprint manually, which is prone to errors and often blindly trusted. The SSH standard describes an alternative to such manual key verification: using the Domain Name System (DNS) to publish the server key information in SSHFP records. In this paper, we conduct a large-scale Internet study to measure the prevalence of SSHFP records among DNS domain names. We scan the Tranco 1M list and over 500 million names from the certificate transparency log over the course of 26 days. The results show that in two studied populations, about 1 in 10,000 domains has SSHFP records, with more than half of them deployed without using DNSSEC, drastically reducing security benefits.
翻译:SSH协议通常用于访问互联网上的远程系统,因为它提供了一个加密和认证的通信渠道。 如果在建立新的连接时客户不知道所展示的服务器密钥, 请用户手动核查关键指纹, 这很容易出错, 并且常常被盲目信任。 SSH标准描述了这种手动关键核查的替代方法: 使用域名系统( DNS) 发布SSHFP 记录中的服务器关键信息。 在本文中, 我们进行了大规模互联网研究, 以测量 SSHFP 记录在 DNS 域名中的普及程度。 我们在26天的时间里扫描 Tranco 1M 列表和5亿多个证书透明日志上的名字。 结果表明, 在两个研究的人群中, 大约1万个区域有SSHFP 记录, 其中半数以上没有使用 DNSSEC, 大大降低了安全效益 。