IETF-SSH archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
Re: diffie-hellman-group14-sha256 vs ssh-rsa and SHA-1
>> Because the host key is used to sign the kex hash, and it's an
>> ssh-rsa key, so its signatures are defined to use SHA-1.
> Not necessarily.
True. To be more precise, the negotiated host-key algorithm was
ssh-rsa, which is defined to use SHA-1.
> [...]. In other words "ssh-rsa" is just generic RSA, and then the
> more specific rsa-sha2-256 is explicitly RSA with SHA-2 if you want
> that.
ssh-rsa as part of a public-key data blob is generic RSA. ssh-rsa as a
negotiated host-key algorithm is not; it is what if the three were
designed today would probably be rsa-sha1-160 or some such (if it were
used at all).
>> I should go looking for specs to implement rsa-sha2-256 and
>> rsa-sha2-512; I was not previously aware they existed....)
> [...] RFC 8332 [...]
Thank you - already found it (by searching my RFC collection for
rsa-sha2-512). I also found I had saved a copy of
draft-ietf-curdle-rsa-sha2-01.txt, indicating I _was_ aware of them at
some point (but, obviously, had managed to forget).
I've now implemented them and find that they break one of my other
assumptions; I need to rethink some aspects of host-key storage. But I
also have some other assumptions to straighten out.
/~\ The ASCII Mouse
\ / Ribbon Campaign
X Against HTML mouse%rodents-montreal.org@localhost
/ \ Email! 7D C8 61 52 5D E7 2D 39 4E F1 31 3E E8 B3 27 4B
Home |
Main Index |
Thread Index |
Old Index