| Summary: | Support for DSA p=2048 q=256/224 bit keys | ||||||
|---|---|---|---|---|---|---|---|
| Product: | Portable OpenSSH | Reporter: | Cipher <dhanukumar1990> | ||||
| Component: | ssh-keygen | Assignee: | Assigned to nobody <unassigned-bugs> | ||||
| Status: | CLOSED DUPLICATE | ||||||
| Severity: | enhancement | CC: | dhanukumar1990, djm, dtucker | ||||
| Priority: | P5 | ||||||
| Version: | 6.1p1 | ||||||
| Hardware: | All | ||||||
| OS: | All | ||||||
| Attachments: |
|
||||||
|
Description
Cipher
2013-06-03 17:49:32 AEST
Right, we don't support DSA keys with q!=160 because the SSH protocol isn't specified for them. We also refuse to generate DSA keys with bit lengths other than 1024 for this reason. Are you generating your keys using openssl directly? Changing this will require a protocol extension and the keys used will be called something other than "ssh-dss". I'm not sure whether it is worth it, since we support ECDSA modes that are faster and more secure. Thanks Damien. Yes we were creating the keys using openssl and also using ssh-keygen(After removing 1024 bit limit gate in the code). One of our third party applications support only DSA keys, so we cant use ECDSA. FIPS 140-2/3 requires 2048 with q=224/256. So how difficult it will be and how much sense will it make to change ssh-dss to use 32 byte seg parts? Thanks. (In reply to Cipher from comment #2) > Thanks Damien. > > Yes we were creating the keys using openssl and also using > ssh-keygen(After removing 1024 bit limit gate in the code). If you're hacking ssh-keygen or generating keys by hand then you're on you're own, but what you're doing is almost certainly not compliant with FIPS 140-3. Short of the new key exchange methods (ie the enhancement request in bug #2109) the only way to comply with both rfc4253 (which requires sha1) and FIPS 140-3 (which says sha1 is permissible for key lengths of exactly 1024 bits) is to allow dsa keys of only 1024 bits, which is what ssh-keygen does. See the discussion in bug #1647. > One of our third party applications support only DSA keys, so we > cant use ECDSA. FIPS 140-2/3 requires 2048 with q=224/256. So how > difficult it will be and how much sense will it make to change > ssh-dss to use 32 byte seg parts? it makes no sense since ssh-dss specifically requires sha1. *** This bug has been marked as a duplicate of bug 2109 *** See also the followup to the mailing list from Mark Baushke: http://lists.mindrot.org/pipermail/openssh-unix-dev/2013-June/031432.html Close all resolved bugs after 7.3p1 release |