-
Improvement
-
Resolution: Not A Defect
-
Minor
-
None
I have read the following:
And exists the Host Key Verification Strategy option and we have available the following options:
1. Known hosts file Verification Strategy
2. Manually provided key Verification Strategy
3. Manually trusted key Verification Strategy
4. Non verifying Verification Strategy
Well, for security reasons, the 4th can be ignored. For the three first options, when would be mandatory use one approach over the other? - for what scenario(s)? - I am posting this issue, because is not clear in the official documentation - I think is wise add some scenarios to help the developer choice the best option.
Thanks for your understanding
- is related to
-
JENKINS-69264 [ssh-agent] Use SSH Host Key verification strategies from git-client-plugin
-
- Open
-
[JENKINS-66601] Add scenarios to help choice the best "Host Key Verification Strategy" option
Resolution | New: Not A Defect [ 7 ] | |
Status | Original: Open [ 1 ] | New: Closed [ 6 ] |
As far as I can tell, the choice between the first three does not have one as mandatory in any case that I can imagine.
If I prefer to manage the host keys of my agents outside of Jenkins configuration files but in the account that runs my Jenkins controller, then I choose option 1. Personally, I prefer to manage my Jenkins configuration inside the files maintained by Jenkins, so I did not choose option 1.
Options 2 and 3 are minor variants of each other. If I choose option 3, then I will be prompted on first connection of the agent to approve the host key that is detected by Jenkins. That is a reasonable approach if I am confident at that time that the agent being connected is the expected agent.
I personally chose option 2 because I prefer to provide the host key while I am configuring the agent rather than waiting until the first connection of the agent. That places some additional burden on me because it requires that I insert the host key of the agent myself. I find that easier, but not significantly different for security purposes. When I'm entering data in the agent configuration, I'm only seconds away from connecting the agent.