Bug 3001 (openpgp-ed25519-cert@monkeysphere.info)

Summary: enable sending OpenPGP-formed certificates for ssh hosts
Product: Portable OpenSSH Reporter: Daniel Kahn Gillmor <dkg>
Component: sshdAssignee: Assigned to nobody <unassigned-bugs>
Status: CLOSED WONTFIX    
Severity: enhancement CC: djm
Priority: P5    
Version: 8.0p1   
Hardware: Other   
OS: Linux   

Description Daniel Kahn Gillmor 2019-05-01 01:58:31 AEST
This is a feature request for in-band transmission of OpenPGP certificates for OpenSSH hosts.

I propose adding a new HostKeyAlgorithm `openpgp-ed25519-cert@monkeysphere.info`, which transmits that same public key material, wrapped in OpenPGP key material to the client.

The first step of the implementation would just be server-side: if the client states a preference for that algorithm, and sshd knows of a `HostKey` named `$FOO` that contains an ed25519 secretkey, and `$FOO.pgp` exists, then `sshd` should just send the content of `$FOO.pgp` over the wire, while working with the secret key found in `$FOO`.

This permits the host to send in-band OpenPGP-style certificates, without `sshd` needing to know anything about the format.

The second step toward making this useful in an OpenSSH-on-both-endpoints ecosystem would be client-side, something like the `KnownHostsCommand` request from bug 1777; i'll defer that discussion over there.
Comment 1 Damien Miller 2020-01-25 23:45:07 AEDT
We don't want to support another certificate algorithm with the requisite additional attack surface and additional, significantly different semantics to OpenSSH's existing key/cert methods, sorry.
Comment 2 Damien Miller 2021-04-23 14:55:40 AEST
closing resolved bugs as of 8.6p1 release