Bug 3001 (openpgp-ed25519-cert@monkeysphere.info) - enable sending OpenPGP-formed certificates for ssh hosts
Summary: enable sending OpenPGP-formed certificates for ssh hosts
Status: CLOSED WONTFIX
Alias: openpgp-ed25519-cert@monkeysphere.info
Product: Portable OpenSSH
Classification: Unclassified
Component: sshd (show other bugs)
Version: 8.0p1
Hardware: Other Linux
: P5 enhancement
Assignee: Assigned to nobody
URL:
Keywords:
Depends on:
Blocks:
 
Reported: 2019-05-01 01:58 AEST by Daniel Kahn Gillmor
Modified: 2021-04-23 14:55 AEST (History)
1 user (show)

See Also:


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Daniel Kahn Gillmor 2019-05-01 01:58:31 AEST
This is a feature request for in-band transmission of OpenPGP certificates for OpenSSH hosts.

I propose adding a new HostKeyAlgorithm `openpgp-ed25519-cert@monkeysphere.info`, which transmits that same public key material, wrapped in OpenPGP key material to the client.

The first step of the implementation would just be server-side: if the client states a preference for that algorithm, and sshd knows of a `HostKey` named `$FOO` that contains an ed25519 secretkey, and `$FOO.pgp` exists, then `sshd` should just send the content of `$FOO.pgp` over the wire, while working with the secret key found in `$FOO`.

This permits the host to send in-band OpenPGP-style certificates, without `sshd` needing to know anything about the format.

The second step toward making this useful in an OpenSSH-on-both-endpoints ecosystem would be client-side, something like the `KnownHostsCommand` request from bug 1777; i'll defer that discussion over there.
Comment 1 Damien Miller 2020-01-25 23:45:07 AEDT
We don't want to support another certificate algorithm with the requisite additional attack surface and additional, significantly different semantics to OpenSSH's existing key/cert methods, sorry.
Comment 2 Damien Miller 2021-04-23 14:55:40 AEST
closing resolved bugs as of 8.6p1 release