IETF-SSH archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
Re: DISCUSS comments on publickeyfile-09
Joseph:
The replacement introduction looks good, but I have a few editorial
suggestions below.
The SSH protocol supports the use of public/private key pairs
in order to perform authentication (public-key authentication.)
... perform authentication based on public-key cryptography.
However, in order to use public-key authentication in the SSH
protocol, public keys must first be exchanged between client
and server.
This document formally describes an existing public-key file
format which can be used with any of the common existing file
transfer mechanisms in order to exchange public keys.
The SSH protocol also uses public/private key pairs to
authenticate the server. In this scenario, it is important
to verify that the public key provided by the server is
indeed the server's public-key.
This document describes a mechanism for creating a short text
string that uniquilly represents a public-key (fingerprinting)
... that uniquely represents a particular public key, called fingerprinting.
for use in manually comparing public keys.
The replacement security considerations text looks good, but I have a few
editorial suggestions below.
The public-key fingerprint method presented here relies on
the MD5 hash, which is known to have certain weaknesses
... MD5 one-way hash function, which ...
regarding it's collision-resistance; however, the particular
use made of MD5 here depends solely on it's 2nd-preimage
resistance, not on it's collision-resistance.
MD5 is used here for historical reasons.
Russ
Home |
Main Index |
Thread Index |
Old Index