[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]


I actually like the ability to specify exactly what algorithms I think
I'm using key-wise, but maybe that's just me.

I would note that it seems like the option SSH_BIND_OPTIONS_HOSTKEY
does something different at the moment than what we might expect.  It
calls ssh_bind_options_set_algo, so this option actually sets the
algorithms that the server will allow.  So perhaps this should be
changed in the documentation.  If we're going to make a new option
like Aris proposes, then we might want to pick a new name to keep old
code working, unless the current behavior is considered a bug.

- Alan

On Sat, Feb 15, 2014 at 7:05 AM, Aris Adamantiadis <aris@xxxxxxxxxxxx> wrote:
> Hi everybody,
> This is also my fault, I worked a lot on server side last year and never
> bothered checking if the server was accepting ecdsa keys.
> Regarding the API, is there any advantage in adding an option specific
> to ECDSA ?
> I see there's already SSH_BIND_OPTIONS_HOSTKEY and if we follow
> OpenSSH's semantics:
>      HostKey
>              Specifies a file containing a private host key used by
> SSH.  The default is
>              /etc/ssh/ssh_host_key for protocol version 1, and
> /etc/ssh/ssh_host_dsa_key,
>              /etc/ssh/ssh_host_ecdsa_key and /etc/ssh/ssh_host_rsa_key
> for protocol version
>              2.  Note that sshd(8) will refuse to use a file if it is
> group/world-accessi-
>              ble.  It is possible to have multiple host key files.
> ``rsa1'' keys are used
>              for version 1 and ``dsa'', ``ecdsa'' or ``rsa'' are used
> for version 2 of the
>              SSH protocol.
> This option should also work with ecdsa, is standard (maps to an openssh
> settings) and doesn't require the caller to know the type of key beforehand.
> Aris
> Le 15/02/14 11:27, Andreas Schneider a écrit :
>> On Friday 14 February 2014 16:41:42 you wrote:
>>> For what it's worth, the attached patch should at fix the missing
>>> option (and remove some duplication in the key option code).
>> Thanks for your patch. I have some comments.
>> @@ -42,6 +42,7 @@ enum ssh_bind_options_e {
>> This will break the ABI. The option should be added at the end of the enum!
>> I know that the style is pretty broken in libssh and I need to write a
>> styleguide. Please use 4 spaces and pki.c or pki_crypt.c should be the style
>> to use.
>> if (ssh_bind_set_key(sshbind, &sshbind->dsakey, value) < 0) {
>> should be:
>> rc = ssh_bind_set_key(sshbind, &sshbind->dsakey, value);
>> if (rc < 0) {}
>> http://blog.cryptomilk.org/2013/03/28/writing-and-reading-code/
>> I will integrate the full example soon. So we can work on that and extend it
>> with ecdsa support.
>>       -- andreas

Re: ECCAlan Dunn <amdunn@xxxxxxxxx>
ECCDustin Oprea <myselfasunder@xxxxxxxxx>
Re: ECCAndreas Schneider <asn@xxxxxxxxxxxxxx>
Re: ECCAlan Dunn <amdunn@xxxxxxxxx>
Re: ECCAndreas Schneider <asn@xxxxxxxxxxxxxx>
Re: ECCAris Adamantiadis <aris@xxxxxxxxxxxx>
Archive administrator: postmaster@lists.cynapses.org