[EXTERNAL] Re: [patch] ssh-keygen(1): by default generate ed25519 key (instead of rsa)

Morgan, Iain (ARC-TN)[InuTeq, LLC] iain.morgan at nasa.gov
Tue Nov 8 06:15:47 AEDT 2022



On 11/6/22, 20:01, "openssh-unix-dev on behalf of Damien Miller" <openssh-unix-dev-bounces+iain.morgan=nasa.gov at mindrot.org on behalf of djm at mindrot.org> wrote:

    On Mon, 7 Nov 2022, Darren Tucker wrote:

    > On Mon, 7 Nov 2022 at 00:51, Job Snijders <job at openbsd.org> wrote:
    > [...]
    > > Perhaps now is a good time to make Ed25519 the default when invoking
    > > ssh-keygen(1) without arguments?
    > 
    > I don't think so.  Outside of DSA (which is REQUIRED in RFC4253 but is
    > considered weak these days), RSA keys are the most widely supported
    > key type and thus most likely to work in any given situation, which
    > makes them an appropriate default.  If you know this is not the case
    > for your environment, that's what "-t" is for.

    I don't mind using defaults to apply a little nudge towards better
    algorithms. OpenSSH has supported ed25519 keys for almost a decade,
    and RFC 8709 has been a standard for a couple of years.

    So I'm cautiously supportive of doing this.

This could be an issue for environments which have to comply with FIPS 140-2, which does not permit ed25519.  In such environments, using -t with ssh-add would work on a per-user basis, but users are so used to the current behaviour that I suspect it would be rather disruptive.

Having said that, by the time such environments move to a version of OpenSSH which implements this proposed change, FIPS 140-3 validated cryptographic modules will hopefully be in place.  I haven't looked over FIPS 140-3, but I recall seeing something that indicated ed25519 might be permitted under it.  If that is true, and various requirements get updated to reflect that, it could be a non-issue.

-- 
Iain



More information about the openssh-unix-dev mailing list