Re: [Curdle] RSA key transport for SSH (RFC 4432) and forward secrecy

Peter Gutmann <pgut001@cs.auckland.ac.nz> Thu, 11 February 2021 05:57 UTC

Return-Path: <pgut001@cs.auckland.ac.nz>
X-Original-To: curdle@ietfa.amsl.com
Delivered-To: curdle@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8BD363A1282 for <curdle@ietfa.amsl.com>; Wed, 10 Feb 2021 21:57:37 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.917
X-Spam-Level:
X-Spam-Status: No, score=-1.917 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_MSPIKE_H4=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id dLfsQmxmFNYn for <curdle@ietfa.amsl.com>; Wed, 10 Feb 2021 21:57:36 -0800 (PST)
Received: from au-smtp-delivery-117.mimecast.com (au-smtp-delivery-117.mimecast.com [180.189.28.117]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8ECD73A127F for <curdle@ietf.org>; Wed, 10 Feb 2021 21:57:35 -0800 (PST)
Received: from AUS01-ME3-obe.outbound.protection.outlook.com (mail-me3aus01lp2241.outbound.protection.outlook.com [104.47.71.241]) (Using TLS) by relay.mimecast.com with ESMTP id au-mta-41-VWNIBiVDNQ--pVRUz5PjFw-1; Thu, 11 Feb 2021 16:57:25 +1100
X-MC-Unique: VWNIBiVDNQ--pVRUz5PjFw-1
Received: from HK2PR06CA0020.apcprd06.prod.outlook.com (2603:1096:202:2e::32) by ME3PR01MB6071.ausprd01.prod.outlook.com (2603:10c6:220:e1::12) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3846.26; Thu, 11 Feb 2021 05:57:20 +0000
Received: from HK2APC01FT058.eop-APC01.prod.protection.outlook.com (2603:1096:202:2e:cafe::c) by HK2PR06CA0020.outlook.office365.com (2603:1096:202:2e::32) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3846.26 via Frontend Transport; Thu, 11 Feb 2021 05:57:19 +0000
X-MS-Exchange-Authentication-Results: spf=none (sender IP is 130.216.95.208) smtp.mailfrom=cs.auckland.ac.nz; mit.edu; dkim=none (message not signed) header.d=none;mit.edu; dmarc=none action=none header.from=cs.auckland.ac.nz
Received: from uxcn13-tdc-e.UoA.auckland.ac.nz (130.216.95.208) by HK2APC01FT058.mail.protection.outlook.com (10.152.249.150) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384) id 15.20.3846.25 via Frontend Transport; Thu, 11 Feb 2021 05:57:18 +0000
Received: from uxcn13-tdc-d.UoA.auckland.ac.nz (10.6.3.5) by uxcn13-tdc-e.UoA.auckland.ac.nz (10.6.3.9) with Microsoft SMTP Server (TLS) id 15.0.1497.2; Thu, 11 Feb 2021 18:57:16 +1300
Received: from uxcn13-tdc-d.UoA.auckland.ac.nz ([fe80::c123:782b:aed6:3e56]) by uxcn13-tdc-d.UoA.auckland.ac.nz ([fe80::c123:782b:aed6:3e56%14]) with mapi id 15.00.1497.010; Thu, 11 Feb 2021 18:57:16 +1300
From: Peter Gutmann <pgut001@cs.auckland.ac.nz>
To: "Mark D. Baushke" <mdb@juniper.net>, Simon Tatham <anakin@pobox.com>, "Ron Frederick" <ronf@timeheart.net>, Alexandre Becoulet <alexandre.becoulet@free.fr>, Keith Winstein <keithw@mit.edu>, "Hari Balakrishnan" <hari@mit.edu>, "mosh-devel@mit.edu" <mosh-devel@mit.edu>
CC: Benjamin Kaduk <kaduk@mit.edu>, "curdle@ietf.org" <curdle@ietf.org>
Thread-Topic: [Curdle] RSA key transport for SSH (RFC 4432) and forward secrecy
Thread-Index: AQHXAC4NqKqKV9dtiEe1pLBRKAvLp6pSYWSs//84DwCAANtDBQ==
Date: Thu, 11 Feb 2021 05:57:16 +0000
Message-ID: <1613023036348.89122@cs.auckland.ac.nz>
References: <20210211042551.GV21@kduck.mit.edu> <1613018828089.63687@cs.auckland.ac.nz>, <94759.1613022658@svl-bsdx-06.juniper.net>
In-Reply-To: <94759.1613022658@svl-bsdx-06.juniper.net>
Accept-Language: en-NZ, en-GB, en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [130.216.158.4]
MIME-Version: 1.0
X-EOPAttributedMessage: 0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 5602c0bb-b92a-4efc-7601-08d8ce51e3f5
X-MS-TrafficTypeDiagnostic: ME3PR01MB6071:
X-Microsoft-Antispam-PRVS: <ME3PR01MB607132A37516456A1B502E6BEE8C9@ME3PR01MB6071.ausprd01.prod.outlook.com>
X-MS-Oob-TLC-OOBClassifiers: OLM:6430
X-MS-Exchange-SenderADCheck: 1
X-Microsoft-Antispam: BCL:0
X-Microsoft-Antispam-Message-Info: gRZDdRSanwm7SvmHZs1yPot64vDGbTYN8wU/d63Za3SCDMe22CvBNn286LDgO3AwFpMc+iSZPHAyLKCtllFaNXvTdKCaRuU+2NC0oq6arA/xyXMPv9ctOKj5ONNcsIXTctutdWHH2nlpuwijs8FomEIg4fAHqSMSsZYsAbpb7MmbAU/ZFUkxPj213RPrjO1sisZ+LH0QtwnIRIlmqEZbGvZh3J3hpu2B9ENDAeJou9SPgU3k5AFHFVmkv32ZA7OqE/hCK9pYMGTAtSukWvfNUk//o5FmNSa2A2k5y3pMzr4J8Z12VYOPKib6qa+uTP6xM7SoHGYvPe4H/cFdzZrn7ysRbvywVYM2cXlE2l3OwvfNomZbJb9+v1npGuTPBfQju/nvai643VVv8ZYC2uVlbYReSXtDduWsbxKbKRAeolh/9fxBZbLhfX3mU/enqF3hKhk759bGVzlsv4P2OA7kH1f5gbkLFwls5p/H/xOsjQFP/RxL3sAfmorfeH0BHPlEzH3ye0yUBoIfodSMOfPJnpofKToDw37SFU0L+nCPMyCWY1oF1eGu7Bw+5sk9lr/5+Z0fEZmjaz+yUrtlwXz2zuIYfHMAAct6mDE/sbKxVcwPXlsX4WOahvO+4mfY0ou+KPbB8ZFhmcSQhAPG95kNC1A67dcpPwrN+SW035s8xSo=
X-Forefront-Antispam-Report: CIP:130.216.95.208; CTRY:NZ; LANG:en; SCL:1; SRV:; IPV:CAL; SFV:NSPM; H:uxcn13-tdc-e.UoA.auckland.ac.nz; PTR:natgate1-1.auckland.ac.nz; CAT:NONE; SFS:(4636009)(39860400002)(136003)(346002)(376002)(396003)(36840700001)(46966006)(47076005)(4326008)(8676002)(2906002)(82310400003)(356005)(54906003)(70206006)(110136005)(82740400003)(36906005)(7636003)(36860700001)(2616005)(5660300002)(26005)(86362001)(336012)(478600001)(8936002)(70586007)(316002)(186003)(786003)(4744005); DIR:OUT; SFP:1101
X-OriginatorOrg: cs.auckland.ac.nz
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 11 Feb 2021 05:57:18.1673 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 5602c0bb-b92a-4efc-7601-08d8ce51e3f5
X-MS-Exchange-CrossTenant-Id: d1b36e95-0d50-42e9-958f-b63fa906beaa
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=d1b36e95-0d50-42e9-958f-b63fa906beaa; Ip=[130.216.95.208]; Helo=[uxcn13-tdc-e.UoA.auckland.ac.nz]
X-MS-Exchange-CrossTenant-AuthSource: HK2APC01FT058.eop-APC01.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: ME3PR01MB6071
X-Mimecast-Spam-Score: 0
X-Mimecast-Originator: cs.auckland.ac.nz
Content-Language: en-NZ
Content-Type: text/plain; charset=WINDOWS-1252
Content-Transfer-Encoding: quoted-printable
Archived-At: <https://mailarchive.ietf.org/arch/msg/curdle/-aLQZCd-pEpJgYVDopMpGn6dPvc>
Subject: Re: [Curdle] RSA key transport for SSH (RFC 4432) and forward secrecy
X-BeenThere: curdle@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "List for discussion of potential new security area wg." <curdle.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/curdle>, <mailto:curdle-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/curdle/>
List-Post: <mailto:curdle@ietf.org>
List-Help: <mailto:curdle-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/curdle>, <mailto:curdle-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 11 Feb 2021 05:57:38 -0000

Mark D. Baushke <mdb@juniper.net> writes:

>I see that rsa2048-sha256 is supported by the following implementations:

Of those, mosh and Putty are client only so presumably they only do it for
compatibility purposes.  Possibly a more useful form of the poll would be
"which servers still rely on RSA?".

Peter.