IETF-SSH archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
Re: x509
On Thu, 31 Jan 2002, Joseph Galbraith wrote:
> > On the subject of whether to use PKCS7 or not I'm not sure what it would
>
> The only question is, are there some cases where we might not be able
> to control it (or where it would be burdensome to execute that
> control.)
>
> If there are, PKCS 7 is a win because even in the face of a hash
> algorithm that we can't change to match SHA-1 as specified by the SSH
> protocol (for example) we can still work.
Hi,
Since the PKCS7 packet carries more info it's more "complete", however
rfc2459 defines one and only one algorithm-id for DSA keys and PKCS1
defines the format of the signature to contain the algorithm-id (OID)
already (if I remember it correctly, it's been a while since I
read/implemented it). PKCS7 is seems a bit overkill in this case (or I
remember things incorrectly, sorry).
Have you (vandyke) implemented x509 host/publickey auth in your
client/servers yet? I haven't tried your stuff out in a while, is it
available for evaluation on the web (server too?).
Cheers,
/Mats
Home |
Main Index |
Thread Index |
Old Index