X.509 for verifying host keys
Nicolas Williams
Nicolas.Williams at ubsw.com
Wed Jan 30 03:12:36 EST 2002
On Tue, Jan 29, 2002 at 08:07:07AM -0800, Dan Kaminsky wrote:
> Anyone actually working on this privately, email me.
>
> I'm honestly thinking of just supporting PEM files outright, though not
> abandoning the perfect forward secrecy of SSH.
Are you doing this merely to deal with known_host maintenance (i.e., to
avoid it altogether)?
Or do you want to do X.509 pubkey userauth as well?
In the latter case you'll definitely need to support CA hierarchies and
you'll need a way to do name-based authorization. Oh, gee, look at that,
I just posted a patch which adds the necessary infrastructure for
name-based authorization and enables it for Kerberos. :)
> --Dan
>
Cheers,
Nico
--
-DISCLAIMER: an automatically appended disclaimer may follow. By posting-
-to a public e-mail mailing list I hereby grant permission to distribute-
-and copy this message.-
Visit our website at http://www.ubswarburg.com
This message contains confidential information and is intended only
for the individual named. If you are not the named addressee you
should not disseminate, distribute or copy this e-mail. Please
notify the sender immediately by e-mail if you have received this
e-mail by mistake and delete this e-mail from your system.
E-mail transmission cannot be guaranteed to be secure or error-free
as information could be intercepted, corrupted, lost, destroyed,
arrive late or incomplete, or contain viruses. The sender therefore
does not accept liability for any errors or omissions in the contents
of this message which arise as a result of e-mail transmission. If
verification is required please request a hard-copy version. This
message is provided for informational purposes and should not be
construed as a solicitation or offer to buy or sell any securities or
related financial instruments.
More information about the openssh-unix-dev
mailing list