Experimental server for RSA SHA-2
denis bider <ietf-ssh3@denisbider.com> Sun, 08 November 2015 15:36 UTC
Return-Path: <bounces-ietf-ssh-owner-secsh-tyoxbijeg7-archive=lists.ietf.org@NetBSD.org>
X-Original-To: ietfarch-secsh-tyoxbijeg7-archive@ietfa.amsl.com
Delivered-To: ietfarch-secsh-tyoxbijeg7-archive@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BDC6C1B30A5 for <ietfarch-secsh-tyoxbijeg7-archive@ietfa.amsl.com>; Sun, 8 Nov 2015 07:36:15 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.909
X-Spam-Level:
X-Spam-Status: No, score=-1.909 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id krx-0tYibqew for <ietfarch-secsh-tyoxbijeg7-archive@ietfa.amsl.com>; Sun, 8 Nov 2015 07:36:13 -0800 (PST)
Received: from mail.netbsd.org (mail.NetBSD.org [IPv6:2001:4f8:3:7::25]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6D8231B3094 for <secsh-tyoxbijeg7-archive@lists.ietf.org>; Sun, 8 Nov 2015 07:36:13 -0800 (PST)
Received: by mail.netbsd.org (Postfix, from userid 605) id 246B714A0E1; Sun, 8 Nov 2015 15:36:12 +0000 (UTC)
Delivered-To: ietf-ssh@netbsd.org
Received: by mail.netbsd.org (Postfix, from userid 1347) id B016414A0E0; Sun, 8 Nov 2015 15:36:11 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1]) by mail.netbsd.org (Postfix) with ESMTP id 72FCF14A227 for <ietf-ssh@netbsd.org>; Sun, 8 Nov 2015 09:11:09 +0000 (UTC)
X-Virus-Scanned: amavisd-new at NetBSD.org
Received: from mail.netbsd.org ([127.0.0.1]) by localhost (mail.NetBSD.org [127.0.0.1]) (amavisd-new, port 10025) with ESMTP id 2sR7Xr0xiY49 for <ietf-ssh@netbsd.org>; Sun, 8 Nov 2015 09:11:08 +0000 (UTC)
Received: from skroderider.denisbider.com (skroderider.denisbider.com [50.18.172.175]) (using TLSv1.1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mail.netbsd.org (Postfix) with ESMTPS id 633CF14A20D for <ietf-ssh@netbsd.org>; Sun, 8 Nov 2015 09:11:08 +0000 (UTC)
X-Footer: ZGVuaXNiaWRlci5jb20=
Received: from localhost ([127.0.0.1]) by skroderider.denisbider.com for pgut001@cs.auckland.ac.nz; Sun, 8 Nov 2015 09:10:53 +0000
Date: Sun, 08 Nov 2015 09:10:53 +0000
Subject: Experimental server for RSA SHA-2
X-User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64; rv:42.0) Gecko/20100101 Firefox/42.0
Message-ID: <2096718084-720@skroderider.denisbider.com>
X-Priority: 3
Importance: Normal
In-Reply-To: <2073638188-720@skroderider.denisbider.com>
MIME-Version: 1.0
From: denis bider <ietf-ssh3@denisbider.com>
To: Peter Gutmann <pgut001@cs.auckland.ac.nz>, "ietf-ssh@netbsd.org" <ietf-ssh@netbsd.org>
Cc: Jeffrey Hutzelman <jhutz@cmu.edu>, NielsMöller <nisse@lysator.liu.se>, "Mark D. Baushke" <mdb@juniper.net>, "stephen.farrell@cs.tcd.ie" <stephen.farrell@cs.tcd.ie>, "jon@siliconcircus.com" <jon@siliconcircus.com>, "djm@mindrot.org" <djm@mindrot.org>, Max Horn <postbox@quendi.de>
Content-Type: multipart/alternative; boundary="=-efczcuIPJQNHLFGb+CeL"
Sender: ietf-ssh-owner@NetBSD.org
List-Id: ietf-ssh.NetBSD.org
Precedence: list
I have set up a server where we can test support for RSA SHA-2. You can connect to it at: experiment.bitvise.com:10712 It is set up to test the new RSA SHA-2 signature methods - rsa-sha2-256 and rsa-sha2-512 - as currently defined here: https://tools.ietf.org/html/draft-rsa-dsa-sha2-256-02 You can test support for these new algorithms for both host and user authentication. To test host authentication, set the list of host key algorithms in your KEXINIT to "rsa-sha2-256" or "rsa-sha2-512". You will need at least one of these for successful key exchange - the server doesn't offer anything else. To test user authentication, log into the account "test" using "rsa-sha2-256" or "rsa-sha2-512" as the signature method. You will need to use the following 2048-bit RSA private key for the server to accept the public key: -----BEGIN RSA PRIVATE KEY----- MIIEoQIBAAKCAQEAmKWhKT/t0vdBSIjDt+yz39yknfNalzGPDR2Hsw1s4PFbuHQU FPBdSL751K9EH9dpI7+npb6bbHIilPlwQXJBqhzRxs/XDHDMXTgIANO9s8D6ag8e Ed47HN7GAmb9uh4Raiffxh9yumM/kxxqjagFVuHfxLLHitfZGZ5OJOOS1TB79FTl wgn+om9LINkChQ14uacfoVCNKqIcRWoGqJ931q9CwOwut6pm6vXNcpMtL6NpaZLH tMkwOpfPyvuZ7ZKFRXzeH6YXwOdDzRqwr4iCyVERTdouKd9IDn6GNGeaPuCCfSg0 SgCNys1zexDuWXJm6hvJPOwM7XsAE8SzkWBQhQIBEQKCAQBH1XkEWlHMsJcxMU0L QjaHduQOGCqhgLvJ78djUZymFzo4rxiCUv640ldzJU08KSJrLQOZSqN+U9QJ3stq F6ZuK64DNKFvRCPvoeWmCUo2eO5QBx01lcF2/2w9XaST0eoT1odsSwjQLrSBdsi7 IeRlHv/kF+Vug7F1d6xNmEUZBwd8IcUNbdRUVTmlksbrHChZiahW4IFVY4TvKdNC V8i7IWtlDYQPQ2leBSa/JCYgHYAsp3PYd2uTfFnPqqggf9R0P/Sr+df7JPXkid8b uOTmK5HT/eSQzYW0FBreonn++YVAtxgE0adk6BPuEm4Z2MvHuK9vHWfo0oVwA6jn vgtRAoGBALpb9t+1ZnG612oR9tTtJK44BGAye4YWUcxOTPMK1RbXnFGdTnexmR+/ ILDMRvePJtSjW/qVeXUqwTGxWM+rJPugshM8iM3atqDNqxNu6kES5MYOB8ED0C87 NjtKNErDRDsuvRTYcN05ZRXOUzl6aRQvn7dSU+UB5WPs21/VG7a7AoGBANGwlkNQ Gim0YsaPCkbkTPTDXjm2N/Q+3NV65DKwz9Zxa+zs4P5logdECipQH2ScPeRnUvbz UfZ2bl9AWCT9XeYtwuL1ql7wghh5yqMltVtNT7VdVudyWly0nZHRGgw9ygwk5gxn Uiza+zNS1oroHKGyE50eeasc1kCY4YzP0MG/AoGBAI6Cj5wDMDjaLEINvMDxlIU5 5TqA9QwvL34dwl+AwRF3s8Xww4i0/J/OZEr2kJ8xO8/IN0cnAobGV4BacRdGo896 4ocuSn9M5gJ/KHhFwjHDJ2pG9t7kzGBadMPtc0g69/EFn6aHZV3gmJg0XcKKyNMz eiLGfGPURgEeiaOi9xNDAoGAGKtc+Nw/UDNW6i7yJnU2OunO2Zz3hiWDZGjPjX42 kbL9o2cph1dAPRcQQTaaSBJhomaCOyuvSiwM/CWwBFoLDAViONGbkrLiIP9FBCKN zoGQ6CkZSGfOZUJs4/p7iPg140+imAwnyQq0JCfdAUh71smn9F3wMj+gvE44pyeB +K0CgYAITZe+CF7vELMcFmoOLP8NeJ4kIPhDeY+jZGs7xLBf+whXqv/B/dzShtJa a+phP7znrIapd/ovO07GYlAgM6vjuriBTO2BLgPrE+kg9uFNgEFdg0qiTXdVBBUa X2LMxNHgbhlZ8/KntaGGVntq7I3BNIzHnPHzFZV1Fx0fGBqZCA== -----END RSA PRIVATE KEY----- denis bider <ietf-ssh3@denisbider.com> , 11/8/2015 2:36 AM: I can make available an experimental build of our SSH Server that will implement these algorithms. Might need to give me a few hours. denis bider <ietf-ssh3@denisbider.com> , 11/8/2015 2:24 AM: The "ecdsa-sha2-..." algorithm names (RFC 5656) do not use the "ssh-" prefix. Neither do the new formats in RFC 6187, i.e. "x509v3-rsa2048-sha256" and "x509v3-ecdsa-sha2-...". In my opinion, the "ssh-" prefix is superfluous. The context of SSH is implied by where the names are used. The prefix would make sense if it were needed to disambiguate from something. However, I am not aware of any proposal for SSH to do a wholesale import of algorithm names from some other, SSH-unaware spec. Moreover, if such names were imported, then THOSE names would be prefixed with something, not the SSH native algorithm names. I think the use of "ssh-" prefixes for all kinds of names was a (small) mistake in the original design. I think we can safely migrate away from it. Therefore, I have specified no "ssh-" prefix for these algorithms. Peter Gutmann <pgut001@cs.auckland.ac.nz> , 11/8/2015 2:23 AM: denis bider <ietf-ssh3@denisbider.com> writes: >(1) I have uploaded a new version of the RSA SHA-2 draft: > >https://tools.ietf.org/html/draft-rsa-dsa-sha2-256-02 Has anyone else implemented this? I've dropped in some quick partial support for it, and I can't see why it wouldn't work transparently to replace the existing form, but being able to test against someone else would be good. Hmm, just saw an issue, I used "ssh-rsa-sha2..." instead of rsa-..., should the new names also have the "ssh-" prefix to match existing usage? As I see it the name has to identify the format used, "ssh-", and the signature algorithm, "rsa-sha...", having just the latter makes it difficult to specify other signature formats. Peter.
- RE: Updated RSA SHA-2 draft / New draft: SSH Exte… Peter Gutmann
- RE: Updated RSA SHA-2 draft / New draft: SSH Exte… Peter Gutmann
- Re: Updated RSA SHA-2 draft / New draft: SSH Exte… Jeffrey Hutzelman
- Experimental server for RSA SHA-2 denis bider
- Re: Updated RSA SHA-2 draft / New draft: SSH Exte… denis bider
- Updated RSA SHA-2 draft / New draft: SSH Extensio… denis bider
- Re: Updated RSA SHA-2 draft / New draft: SSH Exte… denis bider
- Re: Updated RSA SHA-2 draft / New draft: SSH Exte… denis bider
- Re: Updated RSA SHA-2 draft / New draft: SSH Exte… Niels Möller
- Re: Updated RSA SHA-2 draft / New draft: SSH Exte… Niels Möller
- RE: Experimental server for RSA SHA-2 Peter Gutmann
- RE: Updated RSA SHA-2 draft / New draft: SSH Exte… Peter Gutmann
- Re: Updated RSA SHA-2 draft / New draft: SSH Exte… denis bider
- Re: Updated RSA SHA-2 draft / New draft: SSH Exte… denis bider
- Re: Updated RSA SHA-2 draft / New draft: SSH Exte… denis bider
- Re: Updated RSA SHA-2 draft / New draft: SSH Exte… Niels Möller
- RE: Experimental server for RSA SHA-2 Damien Miller
- Re: Updated RSA SHA-2 draft / New draft: SSH Exte… Damien Miller
- RE: Experimental server for RSA SHA-2 Peter Gutmann
- Re: Updated RSA SHA-2 draft / New draft: SSH Exte… Mark D. Baushke
- RE: Experimental server for RSA SHA-2 Damien Miller
- RE: Experimental server for RSA SHA-2 Peter Gutmann
- Re: Experimental server for RSA SHA-2 t.petch
- Re: Updated RSA SHA-2 draft / New draft: SSH Exte… denis bider
- RE: Updated RSA SHA-2 draft / New draft: SSH Exte… Peter Gutmann
- Re: Updated RSA SHA-2 draft / New draft: SSH Exte… denis bider
- Re: Updated RSA SHA-2 draft / New draft: SSH Exte… denis bider
- Re: Updated RSA SHA-2 draft / New draft: SSH Exte… Niels Möller
- Re: Updated RSA SHA-2 draft / New draft: SSH Exte… Niels Möller
- Re: Updated RSA SHA-2 draft / New draft: SSH Exte… denis bider
- Re: Updated RSA SHA-2 draft / New draft: SSH Exte… denis bider
- Re: Updated RSA SHA-2 draft / New draft: SSH Exte… denis bider
- Re: Updated RSA SHA-2 draft / New draft: SSH Exte… denis bider
- Re: Updated RSA SHA-2 draft / New draft: SSH Exte… Niels Möller
- Re: Updated RSA SHA-2 draft / New draft: SSH Exte… Niels Möller
- Re: Updated RSA SHA-2 draft / New draft: SSH Exte… Niels Möller
- Re: Updated RSA SHA-2 draft / New draft: SSH Exte… denis bider