IETF-SSH archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

Re: Comments on draft-ietf-secsh-x509-03



Oskari Saarenmaa wrote:
Some comments on the new x509 draft based on off-list emails and
discussions at IETF-64 and Connectathon:

[SNIP] The signature format for
"x509v3-sign" needs to be specified in more detail, specifically the OID
is an US-ASCII text representation of the identifier, and the signature
is encoded as specified in RFC 3279.

May be the signature format should be part of public key algorithm name.
The client shouldn't guess which signature format is supported by server
and shouldn't send blindly signed authentication request.

Other possibility is to extend 'public key authentication method' with new message[s].
May be a new response SSH_MSG_USERAUTH_X509_OK:
      byte      SSH_MSG_USERAUTH_X509_OK
      string    public key algorithm name from the request, i.e. "x509v3-sign"
      string    public key blob from the request
      name-list signature algorithms supported by server.


In first case we should define many names without to change protocol,
but the client should send a certificate with diferent algorithm names
until server accept one or reject all. Then client can begin with next
certificate and so on and so forth.

In second case is with just one name, but require protocol changes.
:-\


May be SHA1 algorithm is sufficient. The problem with hash algorithms
exist for rsa/dss keys too.


Regards,
Roumen Petrov



Home | Main Index | Thread Index | Old Index