search for: sshsig

Displaying 18 results from an estimated 18 matches for "sshsig".

Did you mean: ssh'ing
2024 Apr 11
1
[PATCH] sshsig: check hashalg before selecting the RSA signature algorithm
...ons that can't support sha512 from signing messages. An example of this is TPMs which mostly only really supports sha256 widely. This change enables `ssh-keygen -Y sign` to honor the `hashalg` option for the signing algorithm. Signed-off-by: Morten Linderud <morten at linderud.pw> --- sshsig.c | 10 ++++++++-- 1 file changed, 8 insertions(+), 2 deletions(-) diff --git a/sshsig.c b/sshsig.c index 470b286a3..033b43353 100644 --- a/sshsig.c +++ b/sshsig.c @@ -190,8 +190,14 @@ sshsig_wrap_sign(struct sshkey *key, const char *hashalg, } /* If using RSA keys then default to a good sig...
2024 Nov 23
2
[PATCH] sshsig: check hashalg before selecting the RSA signature algorithm
...sages. > > An example of this is TPMs which mostly only really supports sha256 > widely. > > This change enables `ssh-keygen -Y sign` to honor the `hashalg` option > for the signing algorithm. > > Signed-off-by: Morten Linderud <morten at linderud.pw> > --- > sshsig.c | 10 ++++++++-- > 1 file changed, 8 insertions(+), 2 deletions(-) > > diff --git a/sshsig.c b/sshsig.c > index 470b286a3..033b43353 100644 > --- a/sshsig.c > +++ b/sshsig.c > @@ -190,8 +190,14 @@ sshsig_wrap_sign(struct sshkey *key, const char *hashalg, > } > >...
2024 Nov 26
1
[PATCH] sshsig: check hashalg before selecting the RSA signature algorithm
...TPMs which mostly only really supports sha256 > > widely. > > > > This change enables `ssh-keygen -Y sign` to honor the `hashalg` option > > for the signing algorithm. > > > > Signed-off-by: Morten Linderud <morten at linderud.pw> > > --- > > sshsig.c | 10 ++++++++-- > > 1 file changed, 8 insertions(+), 2 deletions(-) > > > > diff --git a/sshsig.c b/sshsig.c > > index 470b286a3..033b43353 100644 > > --- a/sshsig.c > > +++ b/sshsig.c > > @@ -190,8 +190,14 @@ sshsig_wrap_sign(struct sshkey *key, const...
2024 Nov 26
1
[PATCH] sshsig: check hashalg before selecting the RSA signature algorithm
...ha256 > > > widely. > > > > > > This change enables `ssh-keygen -Y sign` to honor the `hashalg` option > > > for the signing algorithm. > > > > > > Signed-off-by: Morten Linderud <morten at linderud.pw> > > > --- > > > sshsig.c | 10 ++++++++-- > > > 1 file changed, 8 insertions(+), 2 deletions(-) > > > > > > diff --git a/sshsig.c b/sshsig.c > > > index 470b286a3..033b43353 100644 > > > --- a/sshsig.c > > > +++ b/sshsig.c > > > @@ -190,8 +190,14 @@ sshsig_w...
2024 Nov 23
1
[PATCH] sshsig: check hashalg before selecting the RSA signature algorithm
...this is TPMs which mostly only really supports sha256 >> widely. >> >> This change enables `ssh-keygen -Y sign` to honor the `hashalg` option >> for the signing algorithm. >> >> Signed-off-by: Morten Linderud <morten at linderud.pw> >> --- >> sshsig.c | 10 ++++++++-- >> 1 file changed, 8 insertions(+), 2 deletions(-) >> >> diff --git a/sshsig.c b/sshsig.c >> index 470b286a3..033b43353 100644 >> --- a/sshsig.c >> +++ b/sshsig.c >> @@ -190,8 +190,14 @@ sshsig_wrap_sign(struct sshkey *key, const char *ha...
2023 Oct 20
0
[PATCH] Clean up the regress directory with make clean
...rm -f regress/sk-ssh-ed25519 at openssh.com* + rm -f regress/ssh-ed25519* + rm -f regress/ssh_output + rm -f regress/ssh_proxy.bak + rm -f regress/sshd-log-wrapper.sh + rm -f regress/sshd_config_minimal + rm -f regress/sshd_proxy_host_* + rm -f regress/sshsig-agent-sk-ssh-ed25519 at openssh.com* + rm -f regress/sshsig-agent-ssh-ed25519* + rm -f regress/sshsig-sk-ssh-ed25519 at openssh.com* + rm -f regress/sshsig-ssh-ed25519* + rm -f regress/user_* + rm -f regress/wrong-key* + rm -f regress/*agent*.pub + rm -f re...
2025 May 30
1
[Bug 3829] New: SSH signature armor protocol documentation issue
...table OpenSSH Version: 10.0p2 Hardware: Other OS: Linux Status: NEW Severity: trivial Priority: P5 Component: Documentation Assignee: unassigned-bugs at mindrot.org Reporter: ngraves at ngraves.fr The SSHSIG protocol states that "The base64 encoded blob SHOULD be broken up by newlines every 76 characters." [1] However, it seems that it's in practise broken up each 70 characters in a signature generated with ssh-keygen. It's also quite clear in the code that it's 70 characters a...
2025 Apr 29
1
Multiple allowed signer files in `ssh-keygen -Y verify`
...details *sig_details = NULL; uint64_t verify_time = 0; + size_t i; if (sig_process_opts(opts, nopts, NULL, &verify_time, &print_pubkey) != 0) @@ -2850,9 +2855,23 @@ sig_verify(const char *signature, const char *sig_namespace, } } - if (allowed_keys != NULL && (r = sshsig_check_allowed_keys(allowed_keys, - sign_key, principal, sig_namespace, verify_time)) != 0) { - debug3_fr(r, "sshsig_check_allowed_keys"); + for (i = 0; i < nallowed_keys; i++) { + if ((r = sshsig_check_allowed_keys(allowed_keys[i], sign_key, + principal, sig_namespace, verif...
2025 Apr 23
1
Multiple allowed signer files in `ssh-keygen -Y verify`
Hello, I'm currently evaluating using `ssh-keygen -Y verify` to check OS artifacts (e.g. packages) and I noticed that the `-f allowed_signers_file` option can be passed only once. A side remark: technically it can be passed multiple times without a warning but the last invocation overrides all previous ones. Tested using: $ ssh-keygen -Y verify -f allowed_signers -f /dev/null -n file -s
2024 Oct 29
14
[Bug 3748] New: "webauthn-sk-ecdsa-sha2-nistp256@openssh.com" signature type not supported from ssh agent
...s/certs. However, based on my understanding it should be possible to use "webauthn-sk-ecdsa-sha2-nistp256 at openssh.com" for "sk-ecdsa-sha2-nistp256 at openssh.com" keys (there is an example of this here: https://github.com/openssh/openssh-portable/blob/master/regress/unittests/sshsig/webauthn.html). Perhaps I'm missing something here, it would be great if someone could clarify the current state of webauthn support in general. Many thanks! -- You are receiving this mail because: You are watching the assignee of the bug.
2024 Oct 24
1
[PATCH] Updated gitignore to ignore sshd-session and sshd-auth targets
...e | 2 ++ 1 file changed, 2 insertions(+) diff --git a/.gitignore b/.gitignore index 213041656..c9d4166a7 100644 --- a/.gitignore +++ b/.gitignore @@ -29,6 +29,8 @@ ssh-keysign ssh-pkcs11-helper ssh-sk-helper sshd +sshd-session +sshd-auth !regress/misc/fuzz-harness/Makefile !regress/unittests/sshsig/Makefile tags -- 2.45.2
2020 Jun 09
3
[PATCH v2 0/2] Add openssl engine keys with provider upgrade path
I've architected this in a way that looks future proof at least to the openssl provider transition. What will happen in openssl 3.0.0 is that providers become active and will accept keys via URI. The current file mechanisms will still be available but internally it will become a file URI. To support the provider interface, openssl will have to accept keys by URI instead of file and may
2020 Sep 27
0
Announce: OpenSSH 8.4 released
...challenges for FIDO/U2F keys. When signing messages in ssh-agent using a FIDO key that has an application string that does not start with "ssh:", ensure that the message being signed is one of the forms expected for the SSH protocol (currently public key authentication and sshsig signatures). This prevents ssh-agent forwarding on a host that has FIDO keys attached granting the ability for the remote side to sign challenges for web authentication using those keys too. Note that the converse case of web browsers signing SSH challenges is already precluded bec...
2020 Sep 20
13
Call for testing: OpenSSH 8.4
...challenges for FIDO/U2F keys. When signing messages in ssh-agent using a FIDO key that has an application string that does not start with "ssh:", ensure that the message being signed is one of the forms expected for the SSH protocol (currently public key authentication and sshsig signatures). This prevents ssh-agent forwarding on a host that has FIDO keys attached granting the ability for the remote side to sign challenges for web authentication using those keys too. Note that the converse case of web browsers signing SSH challenges is already precluded bec...
2020 Sep 21
4
Call for testing: OpenSSH 8.4
On Mon, 21 Sep 2020 at 09:53, Hisashi T Fujinaka <htodd at twofifty.com> wrote: > OK, NetBSD-current amd64, NetBSD-9-amd64, and NetBSD-9-i386 all pass all > tests. MacOS, well, I always try it but it has problems. What's the problem on OS X? We test on it regularly (El Capitan and High Sierra) and the only problem I'm aware of is that the native libcrypto on High Sierra is
2020 Jan 30
6
[PATCH 1/2] Add support for openssl engine based keys
...e9612 100644 --- a/Makefile.in +++ b/Makefile.in @@ -136,7 +136,7 @@ SCP_OBJS= scp.o progressmeter.o SSHADD_OBJS= ssh-add.o $(SKOBJS) -SSHAGENT_OBJS= ssh-agent.o ssh-pkcs11-client.o $(SKOBJS) +SSHAGENT_OBJS= ssh-agent.o ssh-pkcs11-client.o ssh-engine.o $(SKOBJS) SSHKEYGEN_OBJS= ssh-keygen.o sshsig.o $(SKOBJS) diff --git a/authfd.c b/authfd.c index 05fd45401..7cd22044e 100644 --- a/authfd.c +++ b/authfd.c @@ -569,6 +569,52 @@ ssh_remove_identity(int sock, struct sshkey *key) return r; } +/* + * Add an engine based identity + */ +int +ssh_add_engine_key(int sock, const char *file, const...
2020 Apr 25
2
[PATCH 1/3] Add private key protection information extraction to ssh-keygen
...y_check_revoked(struct sshkey *key, const char *revoked_keys_file); diff --git a/regress/Makefile b/regress/Makefile index 62794d25fc42..ae6f4dd09edc 100644 --- a/regress/Makefile +++ b/regress/Makefile @@ -92,7 +92,8 @@ LTESTS= ?? ?connect \ ??? ??? ?allow-deny-users \ ??? ??? ?authinfo \ ??? ??? ?sshsig \ -?? ??? ?keygen-comment +?? ??? ?keygen-comment \ +??????? keygen-private-information ? ? ?INTEROP_TESTS=?? ?putty-transfer putty-ciphers putty-kex conch-ciphers diff --git a/regress/keygen-private-information.sh b/regress/keygen-private-information.sh new file mode 100644 index 000000000000..a99...
2020 Jul 21
11
[RFC PATCH 0/4] PAM module for ssh-agent user authentication
Hi, The main (and probably the only) use case of this PAM module is to let sudo authenticate users via their ssh-agent, therefore without having to type any password and without being tempted to use the NOPASSWD sudo option for such convenience. The principle is originally implemented by an existing module [0][1] and many pages that explain how to use it for such purpose can be found online.