IETF-SSH archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

Re: PublicKeyFile Format Security Considerations



----- Original Message -----
From: "Bill Sommerfeld" <sommerfeld%east.sun.com@localhost>
> The big one which jumps out at me is:
>
>  - by design, the file format does not provide meaningful integrity
> protection or authentication of the contents (i.e., this is not a
> certificate) so you have to be careful with how you move the file
> around and how you store it..
>
> - Bill

Bill, Thanks for the help. 

Here's another crack at it.

--Brent

----
Security Considerations

  The file format described by this document provides no mechanism
  to verify the integrity or otherwise detect tampering of the
  data stored in such files. It is the responsibility of the parties
  that create or exchange files written in this format to ensure that 
  appropriate access controls are applied to such files, and that 
  the files, if transfered, are exchanged over a trusted channel.

  The data encoded using this file format is sensitive. Implementors
  are cautioned to verify the correctness of the encoding/decoding
  routines used to save and read files in this format. A malfunctioning
  decoder used to read a public-key file will most likely produce 
  unsound data of unknown cryptographic properties that in the worst
  case could be vulnerable various forms of cryptographic attack.

  This file format allows for headers that contain data associated with
  a public key. This header data could contain an unlimited range of
  information. While in many environments the information conveyed by a 
  "Subject:" header would be considered innocuous public information, the
  potential exposure of information through header data should be 
  reviewed by sites that deploy this file format.

----



Home | Main Index | Thread Index | Old Index