IETF-SSH archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

答复: Relationship between user name and public key pair in Authentication Protocol



Title: 邮件
 
Clarification required, please comment!
 
-----邮件原件-----
发件人: miaofy [mailto:miaofy%huawei.com@localhost]
发送时间: 2003年3月13日 11:21
收件人: 'ietf-ssh%netbsd.org@localhost'
主题: Relationship between user name and public key pair in Authentication Protocol

Hi, all:
 
I have a doubt on draft-ietf-secsh-userauth-16.txt.
 
In section 2.1, there is:
"In any case, if the user does not exist, the authentication request MUST NOT be accepted."
In section 4, there is a sentence like:
"When the server receives this message, it MUST check whether the supplied key is acceptable for authentication, and if so, it MUST check whether the signature is correct."
 
Now the question is: Is there any RELATIONSHIP between the user name and the public key? For example, public key K1 is only used by user U1.
 
If there is relationship, what is it? 1:1, 1:n, n:1 or m:n? I prefer to 1:1 and 1:n because n:1 and m:n have serious security problem.
 
Yours
Miao


Home | Main Index | Thread Index | Old Index