IETF-SSH archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
Re: DISCUSS comments on publickeyfile-09
Joseph:
The replacement introduction looks good, but I have a few editorial 
suggestions below.
  The SSH protocol supports the use of public/private key pairs
  in order to perform authentication (public-key authentication.)
... perform authentication based on public-key cryptography.
  However, in order to use public-key authentication in the SSH
  protocol, public keys must first be exchanged between client
  and server.
  This document formally describes an existing public-key file
  format which can be used with any of the common existing file
  transfer mechanisms in order to exchange public keys.
  The SSH protocol also uses public/private key pairs to
  authenticate the server.  In this scenario, it is important
  to verify that the public key provided by the server is
  indeed the server's public-key.
  This document describes a mechanism for creating a short text
  string that uniquilly represents a public-key (fingerprinting)
... that uniquely represents a particular public key, called fingerprinting.
  for use in manually comparing public keys.
The replacement security considerations text looks good, but I have a few 
editorial suggestions below.
  The public-key fingerprint method presented here relies on
  the MD5 hash, which is known to have certain weaknesses
... MD5 one-way hash function, which ...
  regarding it's collision-resistance; however, the particular
  use made of MD5 here depends solely on it's 2nd-preimage
  resistance, not on it's collision-resistance.
  MD5 is used here for historical reasons.
Russ 
Home |
Main Index |
Thread Index |
Old Index