x509v3-sign-rsa authentication type...

Roumen Petrov openssh at roumenpetrov.info
Mon May 12 23:07:40 EST 2003


  May be problem is different implementation of cert. support in ssh.com 
and SecureCRT.

More about how to compute signatures in OpenSSH:
- "ssh-rsa.c" call openssl functions:
EVP_DigestInit(...)
EVP_DigestUpdate(...)
EVP_DigestFinal(...)
RSA_sign(...)

- my patch call:
EVP_SignInit(...)
EVP_SignUpdate(...)
EVP_SignFinal(...)

- openssl define :
#define EVP_SignInit(a,b)         EVP_DigestInit(a,b)
#define EVP_SignUpdate(a,b,c)             EVP_DigestUpdate(a,b,c)

EVP_SignFinal(...) call EVP_DigestFinal(...), but after this behave 
different.


"ca-bundle.crt" from modssl project show that we have following 
signature algorithms:
- md2WithRSAEncryption
- md5WithRSAEncryption
- sha1WithRSAEncryption

As I can remember may be (it was tested before release of my first 
version and today I cannot remember results) you patch support only "md5 
with rsa encryption" but not other (md2 and sha1) alg. .

As result we should change "ssh-rsa.c" code too. Same changes we should 
do in "ssh-dsa.c". It is simple to have new method with support for both 
key types "x509v3-sign-rsa" and "x509v3-sign-dss".

To be sure that my patch support all cases "make check" generate cert. 
with following sing. alg. for rsa and dsa private keys:
- dsaWithSHA1
- md2WithRSAEncryption
- md4WithRSAEncryption
- md5WithRSAEncryption
- ripemd160WithRSA
- sha1WithRSAEncryption
, i.e. 12 different certificates: 6 for ssh key type "x509v3-sign-rsa" 
and 6 for "x509v3-sign-dss".

Note: windows nt4 (service pack ?) has problems with md4 (?)

I can confirm that SecureCRT windows client can use all 12 combinations 
as identity key in session to OpenSSH server with my patch.

SecureCRT cannot accept certificates as hostkey, but this should be 
tested with new version(s) !

About ssh.com client I don't have any information.

"ssh-x509.c" is base/core of my patch. all other (distinguished name and 
x509 store, manual pages, agent) is to make x509 cert. support in 
OpenSSH more usefull. As example "ssh-keygen -f xxx -y" print a cert. in 
OpenSSH "pub. key" format, "ssh-add -L" print subject (distinguished 
name) and etc.


Markus, can you confirm that you patch is compatible with ssh.com client 
at least for certificate with sing.alg. "md2WithRSAEncryption", 
"md5WithRSAEncryption" and "sha1WithRSAEncryption" ?



Markus Friedl wrote:

>oops, here's the patch
>
>On Fri, May 09, 2003 at 06:29:23PM +0200, Markus Friedl wrote:
>  
>
>>On Fri, May 09, 2003 at 10:56:55AM -0400, Kevin Stefanik wrote:
>>    
>>
>>>Sorry to pester, but I'd really like to get interoperability with Windows 
>>>clients using certificates in the mainline openssh.  Since the heavy lifting 
>>>has already been done (and well!), I hope it's possible.
>>>      
>>>
>>i've been using this patch for hostkeys+x509 support.
>>interop with ssh.com's windows client w/o problem. 
>>
>>but Roumen sees problems with this approach.
>>    
>>




More information about the openssh-unix-dev mailing list