IETF-SSH archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
Re: x.509 signature clarification?
On Thu, Jul 05, 2001 at 01:09:39PM -0600, Joseph Galbraith wrote:
> For x.509 certificates using rsa keys, SSH Communications 3.0
> appears to be using PKCS #1 with MD5. I'm not sure what they
> are doing for DSS signatures.
>
> There appears to be two areas where the draft needs clarification:
>
> 1. Which digest algorithm should be used? (Given that we use
> SHA1 for ssh-rsa keys, this would seem the natural choice.)
yes, i think there is no reason to switch back to MD5,
so this is probably an implementation bug. Older
software from F-secure uses MD5 for "ssh-rsa", too.
> 2. What should the format of the signature be?
>
> I'm tempted to suggest that the signature is in PKCS #7
> format, though this seems to be a bit of an overkill...
i don't see why we cannot use the current "ssh-rsa" encoding:
transfer a x509 certificate in addition to "ssh-rsa" encoded
signature?
since "x509v3-sign-rsa" is not specified in detail, it should be
dropped from the draft and replaced by something like
"x509v5-ssh-rsa"
meaning:
public key is transfered in "x509v3" format and
the current "ssh-rsa" is used for encoding for signatures.
i think all the confusion is due to the fact that a single
identifier is used for specifying to encoding of
keys, certificates and signatures.
i don't see why the current signature formats cannot
be used together with x509 certificates.
-markus
Home |
Main Index |
Thread Index |
Old Index