IETF-SSH archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
Re: Key fingerprints?
>> - I'd like to collect specifications for the various fingerprint
>> formats in use, [...]
> GNU lsh displays openssh-style md5 fingerprints, and ssh.com-style
> "bubble babble".
This is just the sort of thing I was looking for; I'll have to see if I
can dig up a spec for bubble babble fingerprints. At worst I suppose I
can try to work it out from the code; if it's a GNU program I'd be
shocked if source weren't available.
>> - I'd like to come to some kind of agreement for how to compute and
>> represent fingerprints in a way that's a bit more future-friendly
>> with respect to hash algorithms than just printing hashes in hex.
> I'm kind-of skeptic to displaying the fingerprint in some form
> intuitively recognizable and rememberable by humans.
Yes, I agree; any fingerprint with enough information to be worth
bothering with is probably beyond what most humans will be willing to
memorize.
> So I think the primary use case is for the user who actually have the
> expected fingerprint written down and wants to compare it to what's
> displayed on screen.
Or - to cite my own use case - has the correct fingerprint in one
window and wants to compare it with the fingerprint displayed by an ssh
client in another window.
> I totally agree it would be nice to standardize the fingerprints. I
> think it would make sense to
> 1. Use a stronger hash function than md5, and if standardizing
> something new at this time I think it's prudent to also choose
> something stronger than sha1.
Agreed on both counts.
> 2. Consider carefully what length of the fingerprint really is
> needed, and if we think something shorter than 256 bits is good
> enough, truncate the output of sha256 or sha3-256 or whatever
> function is chosen.
I'm actually tending towards using multiple algorithms, each truncated
(or folded) to a short length and then concatenated, with tweaks like
the ones HMAC uses to reduce the utility to an attacker of weaknesses.
After all, we're hashing relatively small data blobs here; extra
computation is not a very big deal.
> 3. Use some more compact and/or more readable alphabet than hex.
Definitely.
> I don't have an informed opinion on whether or not things like
> bubble-babble or the "random ascii-art" thing really helps users.
In general, neither do I. But I have found that, in my own case, the
base-85 encoding is _much_ more usable than the openssh-style hex.
/~\ The ASCII Mouse
\ / Ribbon Campaign
X Against HTML mouse%rodents-montreal.org@localhost
/ \ Email! 7D C8 61 52 5D E7 2D 39 4E F1 31 3E E8 B3 27 4B
Home |
Main Index |
Thread Index |
Old Index