Re: [netmod] SSH keys - draft-ietf-netmod-system-mgmt

Martin Bjorklund <mbj@tail-f.com> Mon, 05 May 2014 05:57 UTC

Return-Path: <mbj@tail-f.com>
X-Original-To: netmod@ietfa.amsl.com
Delivered-To: netmod@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F18C61A0257 for <netmod@ietfa.amsl.com>; Sun, 4 May 2014 22:57:28 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.552
X-Spam-Level:
X-Spam-Status: No, score=-2.552 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RP_MATCHES_RCVD=-0.651, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id W3cbYJDqFmo2 for <netmod@ietfa.amsl.com>; Sun, 4 May 2014 22:57:27 -0700 (PDT)
Received: from mail.tail-f.com (mail.tail-f.com [109.74.15.94]) by ietfa.amsl.com (Postfix) with ESMTP id D99A01A0254 for <netmod@ietf.org>; Sun, 4 May 2014 22:57:26 -0700 (PDT)
Received: from localhost (s193-12-74-81.cust.tele2.se [193.12.74.81]) by mail.tail-f.com (Postfix) with ESMTPSA id 6A71D3941BC; Mon, 5 May 2014 07:57:21 +0200 (CEST)
Date: Mon, 05 May 2014 07:57:20 +0200
Message-Id: <20140505.075720.274914921.mbj@tail-f.com>
To: nisse@lysator.liu.se
From: Martin Bjorklund <mbj@tail-f.com>
In-Reply-To: <nnha5ar39t.fsf@bacon.lysator.liu.se>
References: <nnlhunqplp.fsf@bacon.lysator.liu.se> <1398875570.20380.20.camel@destiny.pc.cs.cmu.edu> <nnha5ar39t.fsf@bacon.lysator.liu.se>
X-Mailer: Mew version 6.5 on Emacs 24.3 / Mule 6.0 (HANACHIRUSATO)
Mime-Version: 1.0
Content-Type: Text/Plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
Archived-At: http://mailarchive.ietf.org/arch/msg/netmod/dUKm45k19eVmgL6USYq6_itVIlA
Cc: ietf-ssh@NetBSD.org, netmod@ietf.org, jhutz@cmu.edu
Subject: Re: [netmod] SSH keys - draft-ietf-netmod-system-mgmt
X-BeenThere: netmod@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: NETMOD WG list <netmod.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/netmod>, <mailto:netmod-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/netmod/>
List-Post: <mailto:netmod@ietf.org>
List-Help: <mailto:netmod-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/netmod>, <mailto:netmod-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 05 May 2014 05:57:29 -0000

nisse@lysator.liu.se (Niels Möller) wrote:
> Jeffrey Hutzelman <jhutz@cmu.edu> writes:
> 
> > On Wed, 2014-04-30 at 08:49 +0200, Niels Möller wrote:
> >> >     However, if we also keep the leaf algorithm, we need to specify
> >> >     what happens if the leaf algorithm has a value that is different
> >> >     from the value embedded in the key blob.
> >> 
> >> Right, eliminating this redundancy makes things simpler.
> >
> > It would, except you can't eliminate it.
> 
> Hmm. I think you're right. So then then the "algorithm" leaf would be
> the name being used in algorithm negotiation and the like, and the "key"
> leaf would be the key blob. The key blob typically starts with a string
> containing the algorithm identifier, but nothing but the ssh
> implementation is expected to care about that detail.

Ok.  But even if I don't know/care about the details; if I want to
configure a key, I need to know that the format my keygen program uses
is compatible with the format the server expects.


> So then the right choice is 1),
> 
> : 1)  Clarify that the leaf "key-data" contains:
> : 
> :          string    certificate or public key format identifier
> :          byte[n]   key/certificate data
> : 
> :     This allows for simple copy-and-paste from normal open ssh and
> :     rfc4716 files.

But Jeffrey Hutzelman wrote:

   But yes, I believe RFC4716 is broken, because it relies on the
   encoding described above, rather than being consistent with the
   requirement "The key type MUST always be explicitly known."

So if we introduce the clarification (1) above, aren't we doing the
same mistake as RFC 4716?

I am a bit confused by the terminology.  What is the difference
between "key", "key data", and "key blob"?



/martin