IETF-SSH archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

Re: draft-ietf-secsh-publickeyfile is stuck



I believe I have addressed Russ's and your comments now.

Thanks,

Joseph

Jacob Nevins wrote:
> Sam Hartman writes:
>> we are waiting for text to clear Russ's discuss comment.
> 
> which appears to be as follows:
> 
> | Section 3.4 says:
> | >
> | > The body of a public key file consists of the public key blob as
> | > described in [I-D.ietf-secsh-transport], section 4.6, ...
> | >
> | There is no section 4.6 in the referenced document.  I assume that
> | this should be a reference to section 6.6.
> 
> (referring now to RFC 4253)
> I agree.
> 
> | The examples in section 3.6 do not seem to match the key blob
> | description in [I-D.ietf-secsh-transport], section 6.6, which says:
> | >
> | > The key type MUST always be explicitly known (from algorithm
> | > negotiation or some other source).  It is not normally included in
> | > the key blob.
> | >
> | But in this context, it is needed.  This document should make this
> | clear with a MUST statement.  Note that it is included in each of
> | the examples.  I base64 decoded them and checked.
> 
> There was a suggestion back in October that the above paragraph was
> misleading and should be stricken from the transport draft. However,
> nothing happened, and now it's in RFC 4253 so we'll have to live with
> it.
> 
> I think the root cause of the confusion is that the term "blob" is
> poorly defined. publickeyfile says (section 3.4):
> 
> : The body of a public key file consists of the public key blob as
> : described in [I-D.ietf-secsh-transport], section 4.6 [...]
> 
> but the relevant section (6.6 as discussed above) does not define the
> term "public key blob" anywhere. It defines the encoding as
> 
> :       string    certificate or public key format identifier
> :       byte[n]   key/certificate data
> 
> In the absence of indications otherwise, I would have thought that
> "public key blob" referred to just the byte[n], not the format
> identifier -- especially as in the later definitions of signature
> formats, "blob" is defined that way.
> 
> However, from the publickeyfile examples and existing practice, it is
> clearly intended that the publickeyfile body includes the format
> identifier.
> 
> Sections 3.4 and 4 of publickeyfile should be amended to make this
> clear. I think that will address Russ' comment.
> 
> 
> (A further comment on RFC 4253 sec 6.6 -- rather late, I know:
> 
> : The certificate part may be a zero length string, but a public key is
> : required.  This is the public key that will be used for
> : authentication.  The certificate sequence contained in the
> : certificate blob can be used to provide authorization.
> 
> What is the "certificate part" referred to here? In the "ssh-rsa" and
> "ssh-dss" formats, I see no certificate, and no zero-length string
> replacing it.
> 
> Going back through the list archives suggests that the first sentence
> has long been considered buggy. Oh well.)
> 
> 
> Further suggestions for publickeyfile-10, not related to Russ' DISCUSS:
> 
> Neither the document title nor the abstract mention that this document
> defines a standard textual representation for public key fingerprints.
> This makes it harder than it could be to discover where the
> fingerprint format is defined.
> 
> I suggest the following paragraph be added to the Abstract:
> 
>    In addition, this document defines a standard textual
>    representation for SSH public key fingerprints.
> 
> 2 (Introduction): typo:
> |    This document describes a mechanism for creating a short text string
> |    that that uniquely represents a particular public key, called
>           ^^^^^
> Remove duplicate "that".
> 
> 3.2.2 (Comment Header): typo:
> 
> |    existing implementations fail if these quotation marks are omitted
>                                                                        ^
> Add full stop at end of sentence.
> 
> 3.3.3 (New Headers): typo, imprecise text, IANA:
> 
> |    New headers that are of the from "x-" are considered experimental,
>                                  ^^^^
> |    and may be used without IETF consensus.
> 
> Suggested replacement text:
> 
>    Headers with header-tags beginning with "x-" are considered
>    experimental, and may be used without IETF consensus.
> 
> |    All other headers are reserved for use only by IETF consensus.
> 
> Doesn't this imply the existence of an IANA registry, contrary to what
> section 5 "IANA Considerations" says?
> 
> 3.5 (Differences with RFC1421 PEM formats): typos:
> |    Implemetors should take care to notice that while the format is
>      ^^^^^^^^^^^
> s/Implemetors/Implementers/
> 
> |    o  The other specifications use different BEGIN/END delimeters (five
>                                                          ^^^^^^^^^^
> s/delimeters/delimiters/
> 




Home | Main Index | Thread Index | Old Index