IETF-SSH archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
Re: drasft-green--secsh-ecc-08 support for certificates
On Fri, Jun 19, 2009 at 09:12:56AM +1000, Douglas Stebila wrote:
> > Suite B plans to be conservative and require the use of certificates
> >for both the server (sent in the SSH_MSG_KEX_ECDH_REPLY) and client
> >(sent in the SSH_MSG_USERAUTH_REQUEST).
> >
> >As described in section 7 of RFC 4252, SSH_MSG_USERAUTH_REQUEST
> >supports
> >a "public key blob" for use in transporting the certificate:
I hadn't noticed this earlier.
There's no way to "require" the use of certificates for either the
server, nor the client host, nor the client user, in SSHv2 _today_ with
the existing SSHv2 algorithm names and specs. To send a cert ina public
key blob slot would not interoperate.
The thing to do is to revive the SSHv2 w/ PKIX document(s) and progress
them. That means adding new SSHv2 host and hostbased/pubkey user
authentication algorithm names that send certs (and OSCP responses,
...). Alternatively push for completion of PKU2U and use that via SSHv2
w/ GSS-API key exchange and/or userauth.
Once those are done, requiring the use of certificates with SSHv2, using
those extensions, in any environment would be fine.
Nico
--
Home |
Main Index |
Thread Index |
Old Index