IETF-SSH archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

Re: Proposal and intent to implement "dsa-sha2-256" SSH key algorithm



On Fri, 2015-10-30 at 03:03 +0000, denis bider wrote:
> Hey Jeffrey,
> 
> thank you for your comments. :-)
> 
> I have updated the draft based on this feedback. Same URL - new version:
> 
> http://www.denisbider.com/draft-dsa-sha2-256.txt

Those updates all look good.

> > If you don't include it, then either implementors will
> > support it anyway, or users will be confused when their
> > keys don't work.
> 
> I've done some testing, and found that Windows CNG cannot import an
> L=2048, N=224 private key generated with Crypto++.
> 
> In the interest of interoperability, I think it's better to prohibit
> this option. I have added language to this effect.

> > I assume that with N=224, you'd want to actually use SHA-224.
> 
> It may be interesting to note that Windows built-in crypto - a major,
> FIPS-certified platform - does not support SHA-224 at all. With DSA, or
> standalone.

> > For that matter, what about _larger_ key sizes?
> > What's to say that NIST won't publish FIPS-186-5
> > with an (L=4096, N=512) option.  
> 
> Allowing for such keys to be used with the same algorithm name would
> break interoperability with applications unaware of such a new
> standard.

I don't understand.  The issue with ssh-dss was that we _didn't_ allow
for larger key sizes.  Well, that and the fact that we specified SHA1,
which doesn't provide sufficient security to keep up with larger key
sizes(*).

So why would it be bad to support larger key sizes with an existing hash
that is already big enough?


(*) In fact, now that I think about it, we probably should have defined
an rsa-sha256 public key algorithm.




Home | Main Index | Thread Index | Old Index