IETF-SSH archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
Re: WG chair nits on draft-ietf-secsh-fingerprint-01.txt
On Tue, Jul 15, 2003 at 05:50:59PM -0400, Bill Sommerfeld wrote:
> (Yes, this is getting repetitive)
> 
> 1) Please split references into normative and non-normative.
> Actualyl, looks like all three are Normative.
> 
> 2) there is no security considerations section in the document.
What do you like to see in the 'Security Considerations' section?
INTERNET-DRAFT                                             Markus Friedl
draft-ietf-secsh-fingerprint-02.txt                  The OpenBSD Project
Expires: January 2004                                          July 2003
                         SSH Fingerprint Format
Status of this Memo
   This document is an Internet-Draft and is in full conformance with
   all provisions of Section 10 of RFC2026.
   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF), its areas, and its working groups.  Note that
   other groups may also distribute working documents as Internet-
   Drafts.
   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other docu- ments at
   any time.  It is inappropriate to use Internet- Drafts as reference
   material or to cite them other than as "work in progress."
   The list of current Internet-Drafts can be accessed at
   http://www.ietf.org/ietf/1id-abstracts.txt
   The list of Internet-Draft Shadow Directories can be accessed at
   http://www.ietf.org/shadow.html.
   Distribution of this memo is unlimited.
Abstract
   This document formally documents the fingerprint format in use for
   verifying public keys from SSH clients and servers.
1. Introduction
   The security of the SSH protocols relies on the verification of
   public host keys.  Since public keys tend to be very large, it is
   difficult for a human to verify an entire host key.  Even with a PKI
   in place, it is useful to have a standard for exchanging short
   fingerprints of public keys.
   This document formally describes the simple key fingerprint format.
Friedl                                                          [Page 1]
INTERNET-DRAFT                                                 July 2003
2. Fingerprint Format
   The fingerprint of a public key consists of the output of the MD5
   message-digest algorithm [RFC-1321].  The input to the algorithm is
   the public key blob as described in [SSH-TRANS].  The output of the
   algorithm is presented to the user as a sequence of 16 octets printed
   as hexadecimal with lowercase letters and separated by colons.
   For example: "c1:b1:30:29:d7:b8:de:6c:97:77:10:d7:46:41:63:87"
3. Security Considerations
   XXX
4. References
   4.1 Normative References
      [SSH-TRANS] Ylonen, T., et al: "SSH Transport Layer Protocol",
      Internet Draft, draft-secsh-transport-15.txt
      [RFC-1321] R. Rivest: "The MD5 Message-Digest Algorithm", April
      1992.
   4.2 Informative References
      [RFC-2026] S. Bradner: "The Internet Standards Process -- Revision
      3", October 1996.
5. Author's  Address:
   Markus Friedl
   markus%openbsd.org@localhost
   Munich, Germany
Friedl                                                          [Page 2]
Home |
Main Index |
Thread Index |
Old Index