ssh-ed25519 implementations

Mark Baushke <mdb@juniper.net> Wed, 10 May 2017 16:18 UTC

Return-Path: <bounces-ietf-ssh-owner-secsh-tyoxbijeg7-archive=lists.ietf.org@NetBSD.org>
X-Original-To: ietfarch-secsh-tyoxbijeg7-archive@ietfa.amsl.com
Delivered-To: ietfarch-secsh-tyoxbijeg7-archive@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 92B5F129C66 for <ietfarch-secsh-tyoxbijeg7-archive@ietfa.amsl.com>; Wed, 10 May 2017 09:18:39 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.09
X-Spam-Level:
X-Spam-Status: No, score=-4.09 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, HEADER_FROM_DIFFERENT_DOMAINS=0.001, RCVD_IN_DNSWL_MED=-2.3, RP_MATCHES_RCVD=-0.001, SPF_PASS=-0.001, T_DKIM_INVALID=0.01, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=fail (1024-bit key) reason="fail (body has been altered)" header.d=juniper.net
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id daewEKX0EC7V for <ietfarch-secsh-tyoxbijeg7-archive@ietfa.amsl.com>; Wed, 10 May 2017 09:18:38 -0700 (PDT)
Received: from mail.netbsd.org (mail.NetBSD.org [IPv6:2001:470:a085:999::25]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E54D7129C56 for <secsh-tyoxbijeg7-archive@lists.ietf.org>; Wed, 10 May 2017 09:18:37 -0700 (PDT)
Received: by mail.netbsd.org (Postfix, from userid 605) id D533D85569; Wed, 10 May 2017 16:18:35 +0000 (UTC)
Delivered-To: ietf-ssh@NetBSD.org
Received: from localhost (localhost [127.0.0.1]) by mail.netbsd.org (Postfix) with ESMTP id CFA1784DA8 for <ietf-ssh@NetBSD.org>; Wed, 10 May 2017 16:18:33 +0000 (UTC)
X-Virus-Scanned: amavisd-new at netbsd.org
Authentication-Results: mail.netbsd.org (amavisd-new); dkim=pass (1024-bit key) header.d=juniper.net
Received: from mail.netbsd.org ([127.0.0.1]) by localhost (mail.netbsd.org [127.0.0.1]) (amavisd-new, port 10025) with ESMTP id e0XYmIuY1kVG for <ietf-ssh@netbsd.org>; Wed, 10 May 2017 16:18:33 +0000 (UTC)
Received: from NAM01-BN3-obe.outbound.protection.outlook.com (mail-bn3nam01on072e.outbound.protection.outlook.com [IPv6:2a01:111:f400:fe41::72e]) by mail.netbsd.org (Postfix) with ESMTP id 9344484CDB for <ietf-ssh@NetBSD.org>; Wed, 10 May 2017 16:18:31 +0000 (UTC)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=juniper.net; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=9LR1jh7Y8ILJ3AtRCwJ57z8LHtDnqEmvUJQDfYfRJVw=; b=TuMVqdLPhmNWRgWGTd3S3QYrQBuUNtWC+joIEpcoDoEq0oUvoG2EK7V14EgohDa9fTPqNpCT7qIKLgPj6utWQtkUhS+eKFvF1SDzKEcBW4aQbtmJCo0vClh5aEjb2+z7Pc4B19nbrlDRpifqETiDWJYd2HFelyl60MZL4iIKC0g=
Received: from BN6PR05MB2916.namprd05.prod.outlook.com (10.173.18.137) by BN6PR05MB2916.namprd05.prod.outlook.com (10.173.18.137) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1084.7; Wed, 10 May 2017 16:18:29 +0000
Received: from BN6PR05MB2916.namprd05.prod.outlook.com ([10.173.18.137]) by BN6PR05MB2916.namprd05.prod.outlook.com ([10.173.18.137]) with mapi id 15.01.1084.017; Wed, 10 May 2017 16:18:29 +0000
From: Mark Baushke <mdb@juniper.net>
To: "ietf-ssh@NetBSD.org" <ietf-ssh@NetBSD.org>
CC: "curdle@ietf.org" <curdle@ietf.org>, Eric Rescorla <ekr@rtfm.com>
Subject: ssh-ed25519 implementations
Thread-Topic: ssh-ed25519 implementations
Thread-Index: AQHSyakPmB025K0AyEG1vsM36lGUqQ==
Date: Wed, 10 May 2017 16:18:29 +0000
Message-ID: <76FD0F39-1F3D-4476-A3D8-D4C942C2EFD1@juniper.net>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: NetBSD.org; dkim=none (message not signed) header.d=none;NetBSD.org; dmarc=none action=none header.from=juniper.net;
x-originating-ip: [66.129.239.12]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; BN6PR05MB2916; 7:7gnGkpz9aQM1h14FcAYB/Q69U2YPThT1C4zvBUF9xlboB2GVAeAVRH8GduxgoLr1BGtL2kDEjlaFHVj8ssJ++1m7zPOWU83gqXzQAMD74wbiVIrnfJ1NFeLP2AJBPQNH956jR3gG0Z5fVgsD7IjFH1ODZqRRsufP8gLl2ALziFvViScSBNYt5PGakYS8+84CeaEyzDjz7vc+PpJ60X9uh6PTPtGDGdbgIcmchrsN7W2jix6gw831WNs6cEpJdK2cbByDDOoOHls4jmc9TP0fZ6mdZ7p6bwA/i21yxZZgovcMcf5ghipDJP6EJ2pLx7byDySMCdA0uQ8lv8zmPnduAw==
x-ms-office365-filtering-correlation-id: 1d95b54b-32b4-45d3-5db7-08d497c031df
x-ms-office365-filtering-ht: Tenant
x-microsoft-antispam: UriScan:; BCL:0; PCL:0; RULEID:(22001)(2017030254075)(48565401081)(201703131423075)(201703031133081); SRVR:BN6PR05MB2916;
x-microsoft-antispam-prvs: <BN6PR05MB2916CFC10BE2A3FF7714EE50BFEC0@BN6PR05MB2916.namprd05.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:(100405760836317);
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(6040450)(601004)(2401047)(5005006)(8121501046)(93006095)(93001095)(10201501046)(3002001)(6055026)(6041248)(20161123558100)(20161123560025)(20161123564025)(20161123562025)(201703131423075)(201702281528075)(201703061421075)(201703061406153)(20161123555025)(6072148); SRVR:BN6PR05MB2916; BCL:0; PCL:0; RULEID:; SRVR:BN6PR05MB2916;
x-forefront-prvs: 03030B9493
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(6009001)(39450400003)(39840400002)(39410400002)(39400400002)(39850400002)(39860400002)(2501003)(2906002)(5660300001)(66066001)(82746002)(3660700001)(3280700002)(478600001)(189998001)(6916009)(83716003)(81166006)(54356999)(50986999)(4326008)(8936002)(25786009)(8676002)(38730400002)(6486002)(86362001)(6436002)(2900100001)(77096006)(99286003)(53936002)(7736002)(305945005)(36756003)(122556002)(6506006)(33656002)(5640700003)(2351001)(102836003)(6116002)(3846002)(110136004)(6306002)(6512007)(54906002)(42262002); DIR:OUT; SFP:1102; SCL:1; SRVR:BN6PR05MB2916; H:BN6PR05MB2916.namprd05.prod.outlook.com; FPR:; SPF:None; MLV:sfv; LANG:en;
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: text/plain; charset="us-ascii"
Content-ID: <F5C6D64527891940866454D3FADDAF6E@namprd05.prod.outlook.com>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginatorOrg: juniper.net
X-MS-Exchange-CrossTenant-originalarrivaltime: 10 May 2017 16:18:29.2029 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: bea78b3c-4cdb-4130-854a-1d193232e5f4
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN6PR05MB2916
Sender: ietf-ssh-owner@NetBSD.org
List-Id: ietf-ssh.NetBSD.org
Precedence: list
List-Unsubscribe: <mailto:majordomo@NetBSD.org?subject=Unsubscribe%20ietf-ssh&body=unsubscribe%20ietf-ssh>

Hi,

Eric Rescorla <ekr@rtfm.com> has brought to my attention that in
https://tools.ietf.org/html/draft-ietf-curdle-ssh-curves-04 it is
currently specifying the SSH encoding of secrets on the wire using the
mpint process as described in section 5 of [RFC4251] while RFC 7748
describes using a little-endian format:

  GF(2^448 - 2^224 - 1) and are encoded as an array of bytes, u,
  in little-endian order such that u[0] + 256*u[1] + 256^2*u[2] + ... +

This seems to be what is being implemeneted for
curve25519-sha256@libssh.org, so I should make
an explicit note of this in the draft.

However, I am unaware of any curve448-sha512 implementations at
present and would like consensus that it should also follow the mpint
method rather than the RFC 7748 method.

Please reply to curdle@ietf.org with your opinions.

        Thank you,
        -- Mark