IETF-SSH archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
Re: x.509 signature clarification?
"Joseph Galbraith" <galb-list%vandyke.com@localhost> writes:
> Looking at RFC 2459, it appears that it describes the profile
> for x.509 certificates, but doesn't really specify anything about
> signature encoding. I think this reference can be dropped.
>
> For x.509 certificates using rsa keys, SSH Communications 3.0
> appears to be using PKCS #1 with MD5. I'm not sure what they
> are doing for DSS signatures.
I think it would make sense to use the same signature encoding as for
ssh-rsa.
> I'm tempted to suggest that the signature is in PKCS #7
> format, though this seems to be a bit of an overkill...
Do you think there's something wrong with the encoding used for
ssh-rsa and ssh-dss? If not, I think it is a bad idea to add
complexity by adding yet another encoding for the same thing.
I don't have any plans to support x.509 at all in the foreseeable
future, but if I did, I would want a single function for doing x.509:
I'd pass a the ssh "key-blob" and a "resource accessed" id (typically
username or hostname) to the x.509 code, and get back the public key,
or NULL if certificate and local configuration did not imply access
rights.
>From then on, I'd like to be able to treat it as a vanilla rsa/dss key
and forget about x.509.
Regards,
/Niels
Home |
Main Index |
Thread Index |
Old Index