Experimental server for RSA SHA-2

denis bider <ietf-ssh3@denisbider.com> Sun, 08 November 2015 15:36 UTC

Return-Path: <bounces-ietf-ssh-owner-secsh-tyoxbijeg7-archive=lists.ietf.org@NetBSD.org>
X-Original-To: ietfarch-secsh-tyoxbijeg7-archive@ietfa.amsl.com
Delivered-To: ietfarch-secsh-tyoxbijeg7-archive@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BDC6C1B30A5 for <ietfarch-secsh-tyoxbijeg7-archive@ietfa.amsl.com>; Sun, 8 Nov 2015 07:36:15 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.909
X-Spam-Level:
X-Spam-Status: No, score=-1.909 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id krx-0tYibqew for <ietfarch-secsh-tyoxbijeg7-archive@ietfa.amsl.com>; Sun, 8 Nov 2015 07:36:13 -0800 (PST)
Received: from mail.netbsd.org (mail.NetBSD.org [IPv6:2001:4f8:3:7::25]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6D8231B3094 for <secsh-tyoxbijeg7-archive@lists.ietf.org>; Sun, 8 Nov 2015 07:36:13 -0800 (PST)
Received: by mail.netbsd.org (Postfix, from userid 605) id 246B714A0E1; Sun, 8 Nov 2015 15:36:12 +0000 (UTC)
Delivered-To: ietf-ssh@netbsd.org
Received: by mail.netbsd.org (Postfix, from userid 1347) id B016414A0E0; Sun, 8 Nov 2015 15:36:11 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1]) by mail.netbsd.org (Postfix) with ESMTP id 72FCF14A227 for <ietf-ssh@netbsd.org>; Sun, 8 Nov 2015 09:11:09 +0000 (UTC)
X-Virus-Scanned: amavisd-new at NetBSD.org
Received: from mail.netbsd.org ([127.0.0.1]) by localhost (mail.NetBSD.org [127.0.0.1]) (amavisd-new, port 10025) with ESMTP id 2sR7Xr0xiY49 for <ietf-ssh@netbsd.org>; Sun, 8 Nov 2015 09:11:08 +0000 (UTC)
Received: from skroderider.denisbider.com (skroderider.denisbider.com [50.18.172.175]) (using TLSv1.1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mail.netbsd.org (Postfix) with ESMTPS id 633CF14A20D for <ietf-ssh@netbsd.org>; Sun, 8 Nov 2015 09:11:08 +0000 (UTC)
X-Footer: ZGVuaXNiaWRlci5jb20=
Received: from localhost ([127.0.0.1]) by skroderider.denisbider.com for pgut001@cs.auckland.ac.nz; Sun, 8 Nov 2015 09:10:53 +0000
Date: Sun, 08 Nov 2015 09:10:53 +0000
Subject: Experimental server for RSA SHA-2
X-User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64; rv:42.0) Gecko/20100101 Firefox/42.0
Message-ID: <2096718084-720@skroderider.denisbider.com>
X-Priority: 3
Importance: Normal
In-Reply-To: <2073638188-720@skroderider.denisbider.com>
MIME-Version: 1.0
From: denis bider <ietf-ssh3@denisbider.com>
To: Peter Gutmann <pgut001@cs.auckland.ac.nz>, "ietf-ssh@netbsd.org" <ietf-ssh@netbsd.org>
Cc: Jeffrey Hutzelman <jhutz@cmu.edu>, NielsMöller <nisse@lysator.liu.se>, "Mark D. Baushke" <mdb@juniper.net>, "stephen.farrell@cs.tcd.ie" <stephen.farrell@cs.tcd.ie>, "jon@siliconcircus.com" <jon@siliconcircus.com>, "djm@mindrot.org" <djm@mindrot.org>, Max Horn <postbox@quendi.de>
Content-Type: multipart/alternative; boundary="=-efczcuIPJQNHLFGb+CeL"
Sender: ietf-ssh-owner@NetBSD.org
List-Id: ietf-ssh.NetBSD.org
Precedence: list

I have set up a server where we can test support for RSA SHA-2.

You can connect to it at:

experiment.bitvise.com:10712

It is set up to test the new RSA SHA-2 signature methods - rsa-sha2-256 and rsa-sha2-512 - as currently defined here:

https://tools.ietf.org/html/draft-rsa-dsa-sha2-256-02

You can test support for these new algorithms for both host and user authentication.

To test host authentication, set the list of host key algorithms in your KEXINIT to "rsa-sha2-256" or "rsa-sha2-512". You will need at least one of these for successful key exchange - the server doesn't offer anything else.

To test user authentication, log into the account "test" using "rsa-sha2-256" or "rsa-sha2-512" as the signature method. You will need to use the following 2048-bit RSA private key for the server to accept the public key:

-----BEGIN RSA PRIVATE KEY-----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-----END RSA PRIVATE KEY-----


denis bider <ietf-ssh3@denisbider.com> , 11/8/2015 2:36 AM:
I can make available an experimental build of our SSH Server that will implement these algorithms.

Might need to give me a few hours.


denis bider <ietf-ssh3@denisbider.com> , 11/8/2015 2:24 AM:
The "ecdsa-sha2-..." algorithm names (RFC 5656) do not use the "ssh-" prefix.

Neither do the new formats in RFC 6187, i.e. "x509v3-rsa2048-sha256" and "x509v3-ecdsa-sha2-...".

In my opinion, the "ssh-" prefix is superfluous. The context of SSH is implied by where the names are used.

The prefix would make sense if it were needed to disambiguate from something. However, I am not aware of any proposal for SSH to do a wholesale import of algorithm names from some other, SSH-unaware spec. Moreover, if such names were imported, then THOSE names would be prefixed with something, not the SSH native algorithm names.

I think the use of "ssh-" prefixes for all kinds of names was a (small) mistake in the original design. I think we can safely migrate away from it.

Therefore, I have specified no "ssh-" prefix for these algorithms.


Peter Gutmann <pgut001@cs.auckland.ac.nz> , 11/8/2015 2:23 AM:
denis bider <ietf-ssh3@denisbider.com> writes:

>(1) I have uploaded a new version of the RSA SHA-2 draft:
>
>https://tools.ietf.org/html/draft-rsa-dsa-sha2-256-02

Has anyone else implemented this?  I've dropped in some quick partial support
for it, and I can't see why it wouldn't work transparently to replace the
existing form, but being able to test against someone else would be good.

Hmm, just saw an issue, I used "ssh-rsa-sha2..." instead of rsa-..., should
the new names also have the "ssh-" prefix to match existing usage?  As I see
it the name has to identify the format used, "ssh-", and the signature
algorithm, "rsa-sha...", having just the latter makes it difficult to specify
other signature formats.

Peter.