search for: rfc4716

Displaying 20 results from an estimated 20 matches for "rfc4716".

2009 Feb 02
3
Question about key file formats used by OpenSSH
...9;m implementing SSH agent functionality in a program of mine, with the ability to add/remove keys files as saved by OpenSSH. So I'm trying to figure out which formats OpenSSH uses natively for the different types of keys. The only specification related to SSH key file formats I've found is RFC4716 (SSH Public Key File Format). Analysis of ssh-keygen output with varying key types shows the following four formats for which I haven't found any specification: * Something similar to RFC4716 and RFC1421, but not quite the same. Used by OpenSSH for version 2 DSA and RSA private keys. *...
2013 Dec 09
1
[Bug 2180] New: Improve the handling of the key comment field
...ty: P5 Component: ssh-keygen Assignee: unassigned-bugs at mindrot.org Reporter: 4.l.e.x.1.1.s+mindrotopenbsd at gmail.com Hello, As you probably know, the comment header: - is not exported when "ssh-keygen -e" is used to export a public key into an PEM|PKCS8|RFC4716 file format (a new key comment is created) - is not handled when "ssh-keygen -i" is imported from PEM|PKCS8|RFC4716 file to Openssh internal format (the key comment field is missing). Thus, it should be interesting that "ssh-keygen -e" exports the initial comment and "ssh-...
2009 Aug 06
6
[Bug 1630] New: ssh-keygen export of public keys (RFC4716 format) can include too-long lines
https://bugzilla.mindrot.org/show_bug.cgi?id=1630 Summary: ssh-keygen export of public keys (RFC4716 format) can include too-long lines Product: Portable OpenSSH Version: 5.1p1 Platform: All OS/Version: All Status: NEW Severity: minor Priority: P4 Component: ssh-keygen AssignedTo: unassigne...
2016 May 23
3
[Bug 2570] New: ssh-keygen -p will convert openssh-format keyfiles back to pem, improperly?
https://bugzilla.mindrot.org/show_bug.cgi?id=2570 Bug ID: 2570 Summary: ssh-keygen -p will convert openssh-format keyfiles back to pem, improperly? Product: Portable OpenSSH Version: 7.2p1 Hardware: All OS: Linux Status: NEW Severity: normal Priority: P5 Component:
2020 Apr 25
2
[PATCH 1/3] Add private key protection information extraction to ssh-keygen
...mation extraction from private key" + +check_private_key () { +?? ?file="$1" +?? ?format="$2" +?? ?comment="$3" +?? ?secret="$4" +?? ?rounds="$5" + +?? ?# construct expected output in $exp file +?? ?exp=$OBJ/$t-expected +?? ?# default format is RFC4716 +?? ?test -z "$format" && format="RFC4716" +?? ?# Currently PKCS8 is detected as PEM, should be fixed in ssh-keygen +?? ?test "$format" = "PKCS8" && format="PEM" +?? ?cat > $exp << EOF +$comment +Key protection details: +Fil...
2023 Mar 02
0
[Bug 3545] New: Output from ssh-keygen -e, which should always be a public-key, is not accepted by ssh-keygen -l
...aybe my-ef is a private-key ssh-keygen -yf my-ef.pub Load key "my-ef.pub": error in libcrypto man ssh-keygen -e This option will read a private or public OpenSSH key file and print to stdout a public key in one of the formats pecified by the -m option. The default export format is ?RFC4716?. This op?tion allows exporting OpenSSH keys for use by other programs, in?cluding several commercial SSH implementations. -- You are receiving this mail because: You are watching the assignee of the bug.
2011 Nov 14
1
Is there a documentation of the key file formats?
Hello, part of a usual OpenSSH installation are quite some files containing key material, like private keys (id_rsa, id_dsa, id_ecdsa) and the corresponding public keys (id_rsa.pub, id_dsa.pub, id_ecdsa.pub). Inspired by a recent question on Stack Overflow [1], I had a look at the OpenSSH documentation to see what format these key files have. The sshd man page [2] contains some paragraphs about
2012 Jul 28
1
[PATCH] ssh-keygen: support public key import/export using SubjectPublicKeyInfo
...eygen.1 +++ b/ssh-keygen.1 @@ -334,9 +334,11 @@ The supported key formats are: (RFC 4716/SSH2 public or private key), .Dq PKCS8 (PEM PKCS8 public key) -or .Dq PEM -(PEM public key). +(PEM public key) +or +.Dq SUBJECTINFO +(SubjectPublicKeyInfo public key). The default conversion format is .Dq RFC4716 . .It Fl N Ar new_passphrase diff --git a/ssh-keygen.c b/ssh-keygen.c index 5fcd3a1..072c49a 100644 --- a/ssh-keygen.c +++ b/ssh-keygen.c @@ -137,7 +137,8 @@ int convert_from = 0; enum { FMT_RFC4716, FMT_PKCS8, - FMT_PEM + FMT_PEM, + FMT_SUBJECTINFO } convert_format = FMT_RFC4716; int print...
2020 Apr 17
2
[PATCH] regression of comment extraction in private key file without passphrase
Hi Le 17/04/2020 ? 05:52, Damien Miller a ?crit?: > On Wed, 15 Apr 2020, Lo?c wrote: > >> Hello, >> >> In one recent change >> (https://anongit.mindrot.org/openssh.git/commit/?id=2b13d3934d5803703c04803ca3a93078ecb5b715), >> I noticed a regression. >> >> If ssh-keygen is given a private file without passphrase and without the >> corresponding
2013 Dec 07
4
New key type (ed25519) and private key format
Hi, Markus has just committed a few changes that add support for the Ed25519 signature algorithm[1] as a new private key type. This algorithm has a few benefits: it is fast (comparable to ECDSA and RSA), offers 256-bit security and doesn't require random numbers to generate a signature. This last property means it completely avoids (EC-)DSA's horrible, private-key leaking problem when fed
2010 Aug 23
0
Announce: OpenSSH 5.6 released
...ig Hostname options. While this sounds useless, it is actually handy for working with unqualified hostnames: Host *.* Hostname %h Host * Hostname %h.example.org * Allow ssh-keygen(1) to import (-i) and export (-e) of PEM and PKCS#8 keys in addition to RFC4716 (SSH.COM) encodings via a new -m option (bz#1749) * sshd(8) will now queue debug messages for bad ownership or permissions on the user's keyfiles encountered during authentication and will send them after authentication has successfully completed. These messages may be viewed in...
2020 May 27
0
Announce: OpenSSH 8.3 released
...y to dump the contents of a binary key revocation list via "ssh-keygen -lQf /path" bz#3132 Bugfixes -------- * ssh(1): fix IdentitiesOnly=yes to also apply to keys loaded from a PKCS11Provider; bz#3141 * ssh-keygen(1): avoid NULL dereference when trying to convert an invalid RFC4716 private key. * scp(1): when performing remote-to-remote copies using "scp -3", start the second ssh(1) channel with BatchMode=yes enabled to avoid confusing and non-deterministic ordering of prompts. * ssh(1), ssh-keygen(1): when signing a challenge using a FIDO token, perfor...
2010 Aug 09
8
Call for testing: OpenSSH-5.6
...n ssh_config Hostname options. While this sounds useless, it is actually handy for working with unqualified hostnames: Host *.* Hostname %h Host * Hostname %h.example.org * Allow ssh-keygen(1) to import (-i) and export (-e) of PEM and PKCS#8 keys in addition to RFC4716 (SSH.COM) encodings via a new -m option (bz#1749) * sshd(8) will now queue debug messages for bad ownership or permissions on the user's keyfiles encountered during authentication. These messages will be sent after the user has successfully authenticated. These messages may be vie...
2010 Mar 08
0
Announce: OpenSSH 5.4 released
...* Do not prompt for a passphrase if we fail to open a keyfile, and log the reason why the open failed to debug. bz#1693 * Document that the PubkeyAuthentication directive is allowed in a sshd_config(5) Match block. bz#1577 * When converting keys, truncate key comments at 72 chars as per RFC4716. bz#1630 * Do not allow logins if /etc/nologin exists but is not readable by the user logging in. * Output a debug log if sshd(8) can't open an existing authorized_keys. bz#1694 * Quell tc[gs]etattr warnings when forcing a tty (ssh -tt), since we usually don't actually have a tt...
2020 Feb 23
4
Question about ssh-rsa deprecation notice (was: Announce: OpenSSH 8.2 released)
I am trying to understand the details of the deprecation notice. Because I am getting people asking me questions. And I don't know the answer. Therefore I am pushing the boulder uphill and asking here. :-) Damien Miller wrote: > Future deprecation notice > ========================= > > It is now possible[1] to perform chosen-prefix attacks against the > SHA-1 algorithm for
2010 Aug 23
3
Announce: OpenSSH 5.6 released
...ig Hostname options. While this sounds useless, it is actually handy for working with unqualified hostnames: Host *.* Hostname %h Host * Hostname %h.example.org * Allow ssh-keygen(1) to import (-i) and export (-e) of PEM and PKCS#8 keys in addition to RFC4716 (SSH.COM) encodings via a new -m option (bz#1749) * sshd(8) will now queue debug messages for bad ownership or permissions on the user's keyfiles encountered during authentication and will send them after authentication has successfully completed. These messages may be viewed in...
2010 Mar 08
1
Announce: OpenSSH 5.4 released
...* Do not prompt for a passphrase if we fail to open a keyfile, and log the reason why the open failed to debug. bz#1693 * Document that the PubkeyAuthentication directive is allowed in a sshd_config(5) Match block. bz#1577 * When converting keys, truncate key comments at 72 chars as per RFC4716. bz#1630 * Do not allow logins if /etc/nologin exists but is not readable by the user logging in. * Output a debug log if sshd(8) can't open an existing authorized_keys. bz#1694 * Quell tc[gs]etattr warnings when forcing a tty (ssh -tt), since we usually don't actually have a tt...
2020 May 12
9
Call for testing: OpenSSH 8.3
...y to dump the contents of a binary key revocation list via "ssh-keygen -lQf /path" bz#3132 Bugfixes -------- * ssh(1): fix IdentitiesOnly=yes to also apply to keys loaded from a PKCS11Provider; bz#3141 * ssh-keygen(1): avoid NULL dereference when trying to convert an invalid RFC4716 private key. * scp(2): when performing remote-to-remote copies using "scp -3", start the second ssh(1) channel with BatchMode=yes enabled to avoid confusing and non-deterministic ordering of prompts. * ssh(1), ssh-keygen(1): when signing a challenge using a FIDO token, perfor...
2010 Feb 27
24
Call for testing: OpenSSH-5.4
...* Do not prompt for a passphrase if we fail to open a keyfile, and log the reason why the open failed to debug. bz#1693 * Document that the PubkeyAuthentication directive is allowed in a sshd_config(5) Match block. bz#1577 * When converting keys, truncate key comments at 72 chars as per RFC4716. bz#1630 * Do not allow logins if /etc/nologin exists but is not readable by the user logging in. * Output a debug log if sshd(8) can't open an existing authorized_keys. bz#1694 * Quell tc[gs]etattr warnings when forcing a tty (ssh -tt), since we usually don't actually have a tt...
2009 Jul 31
112
[Bug 1626] New: Bugs intended to be fixed in 5.4
https://bugzilla.mindrot.org/show_bug.cgi?id=1626 Summary: Bugs intended to be fixed in 5.4 Product: Portable OpenSSH Version: -current Platform: Other OS/Version: Mac OS X Status: NEW Severity: normal Priority: P2 Component: Miscellaneous AssignedTo: unassigned-bugs at mindrot.org