IETF-SSH archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

Relationship between user name and public key pair in Authentication Protocol



Title: 邮件
Hi, all:
 
I have a doubt on draft-ietf-secsh-userauth-16.txt.
 
In section 2.1, there is:
"In any case, if the user does not exist, the authentication request MUST NOT be accepted."
In section 4, there is a sentence like:
"When the server receives this message, it MUST check whether the supplied key is acceptable for authentication, and if so, it MUST check whether the signature is correct."
 
Now the question is: Is there any RELATIONSHIP between the user name and the public key? For example, public key K1 is only used by user U1.
 
If there is relationship, what is it? 1:1, 1:n, n:1 or m:n? I prefer to 1:1 and 1:n because n:1 and m:n have serious security problem.
 
Yours
Miao


Home | Main Index | Thread Index | Old Index