2010-03-08 11:19:52 +00:00
|
|
|
This document describes a simple public-key certificate authentication
|
|
|
|
system for use by SSH.
|
|
|
|
|
|
|
|
Background
|
|
|
|
----------
|
|
|
|
|
|
|
|
The SSH protocol currently supports a simple public key authentication
|
2011-02-17 11:47:40 +00:00
|
|
|
mechanism. Unlike other public key implementations, SSH eschews the use
|
|
|
|
of X.509 certificates and uses raw keys. This approach has some benefits
|
|
|
|
relating to simplicity of configuration and minimisation of attack
|
|
|
|
surface, but it does not support the important use-cases of centrally
|
|
|
|
managed, passwordless authentication and centrally certified host keys.
|
2010-03-08 11:19:52 +00:00
|
|
|
|
|
|
|
These protocol extensions build on the simple public key authentication
|
2011-02-17 11:47:40 +00:00
|
|
|
system already in SSH to allow certificate-based authentication. The
|
|
|
|
certificates used are not traditional X.509 certificates, with numerous
|
|
|
|
options and complex encoding rules, but something rather more minimal: a
|
|
|
|
key, some identity information and usage options that have been signed
|
|
|
|
with some other trusted key.
|
2010-03-08 11:19:52 +00:00
|
|
|
|
|
|
|
A sshd server may be configured to allow authentication via certified
|
2011-02-17 11:47:40 +00:00
|
|
|
keys, by extending the existing ~/.ssh/authorized_keys mechanism to
|
|
|
|
allow specification of certification authority keys in addition to
|
|
|
|
raw user keys. The ssh client will support automatic verification of
|
|
|
|
acceptance of certified host keys, by adding a similar ability to
|
|
|
|
specify CA keys in ~/.ssh/known_hosts.
|
2010-03-08 11:19:52 +00:00
|
|
|
|
2011-02-17 11:47:40 +00:00
|
|
|
Certified keys are represented using new key types:
|
|
|
|
|
|
|
|
ssh-rsa-cert-v01@openssh.com
|
|
|
|
ssh-dss-cert-v01@openssh.com
|
|
|
|
ecdsa-sha2-nistp256-cert-v01@openssh.com
|
|
|
|
ecdsa-sha2-nistp384-cert-v01@openssh.com
|
|
|
|
ecdsa-sha2-nistp521-cert-v01@openssh.com
|
|
|
|
|
|
|
|
These include certification information along with the public key
|
|
|
|
that is used to sign challenges. ssh-keygen performs the CA signing
|
|
|
|
operation.
|
2010-03-08 11:19:52 +00:00
|
|
|
|
|
|
|
Protocol extensions
|
|
|
|
-------------------
|
|
|
|
|
|
|
|
The SSH wire protocol includes several extensibility mechanisms.
|
|
|
|
These modifications shall take advantage of namespaced public key
|
|
|
|
algorithm names to add support for certificate authentication without
|
|
|
|
breaking the protocol - implementations that do not support the
|
|
|
|
extensions will simply ignore them.
|
|
|
|
|
|
|
|
Authentication using the new key formats described below proceeds
|
|
|
|
using the existing SSH "publickey" authentication method described
|
|
|
|
in RFC4252 section 7.
|
|
|
|
|
|
|
|
New public key formats
|
|
|
|
----------------------
|
|
|
|
|
2011-02-17 11:47:40 +00:00
|
|
|
The certificate key types take a similar high-level format (note: data
|
|
|
|
types and encoding are as per RFC4251 section 5). The serialised wire
|
|
|
|
encoding of these certificates is also used for storing them on disk.
|
2010-03-08 11:19:52 +00:00
|
|
|
|
|
|
|
#define SSH_CERT_TYPE_USER 1
|
|
|
|
#define SSH_CERT_TYPE_HOST 2
|
|
|
|
|
|
|
|
RSA certificate
|
|
|
|
|
2010-11-08 10:45:44 +00:00
|
|
|
string "ssh-rsa-cert-v01@openssh.com"
|
|
|
|
string nonce
|
2010-03-08 11:19:52 +00:00
|
|
|
mpint e
|
|
|
|
mpint n
|
2010-11-08 10:45:44 +00:00
|
|
|
uint64 serial
|
2010-03-08 11:19:52 +00:00
|
|
|
uint32 type
|
|
|
|
string key id
|
|
|
|
string valid principals
|
|
|
|
uint64 valid after
|
|
|
|
uint64 valid before
|
2010-11-08 10:45:44 +00:00
|
|
|
string critical options
|
|
|
|
string extensions
|
2010-03-08 11:19:52 +00:00
|
|
|
string reserved
|
|
|
|
string signature key
|
|
|
|
string signature
|
|
|
|
|
|
|
|
DSA certificate
|
|
|
|
|
2010-11-08 10:45:44 +00:00
|
|
|
string "ssh-dss-cert-v01@openssh.com"
|
|
|
|
string nonce
|
2010-03-08 11:19:52 +00:00
|
|
|
mpint p
|
|
|
|
mpint q
|
|
|
|
mpint g
|
|
|
|
mpint y
|
2010-11-08 10:45:44 +00:00
|
|
|
uint64 serial
|
2010-03-08 11:19:52 +00:00
|
|
|
uint32 type
|
|
|
|
string key id
|
|
|
|
string valid principals
|
|
|
|
uint64 valid after
|
|
|
|
uint64 valid before
|
2010-11-08 10:45:44 +00:00
|
|
|
string critical options
|
|
|
|
string extensions
|
2010-03-08 11:19:52 +00:00
|
|
|
string reserved
|
|
|
|
string signature key
|
|
|
|
string signature
|
|
|
|
|
2011-02-17 11:47:40 +00:00
|
|
|
ECDSA certificate
|
|
|
|
|
|
|
|
string "ecdsa-sha2-nistp256@openssh.com" |
|
|
|
|
"ecdsa-sha2-nistp384@openssh.com" |
|
|
|
|
"ecdsa-sha2-nistp521@openssh.com"
|
|
|
|
string nonce
|
|
|
|
string curve
|
|
|
|
string public_key
|
|
|
|
uint64 serial
|
|
|
|
uint32 type
|
|
|
|
string key id
|
|
|
|
string valid principals
|
|
|
|
uint64 valid after
|
|
|
|
uint64 valid before
|
|
|
|
string critical options
|
|
|
|
string extensions
|
|
|
|
string reserved
|
|
|
|
string signature key
|
|
|
|
string signature
|
|
|
|
|
2010-11-08 10:45:44 +00:00
|
|
|
The nonce field is a CA-provided random bitstring of arbitrary length
|
|
|
|
(but typically 16 or 32 bytes) included to make attacks that depend on
|
|
|
|
inducing collisions in the signature hash infeasible.
|
|
|
|
|
2010-03-08 11:19:52 +00:00
|
|
|
e and n are the RSA exponent and public modulus respectively.
|
|
|
|
|
|
|
|
p, q, g, y are the DSA parameters as described in FIPS-186-2.
|
|
|
|
|
2011-02-17 11:47:40 +00:00
|
|
|
curve and public key are respectively the ECDSA "[identifier]" and "Q"
|
|
|
|
defined in section 3.1 of RFC5656.
|
|
|
|
|
2010-11-08 10:45:44 +00:00
|
|
|
serial is an optional certificate serial number set by the CA to
|
|
|
|
provide an abbreviated way to refer to certificates from that CA.
|
|
|
|
If a CA does not wish to number its certificates it must set this
|
|
|
|
field to zero.
|
|
|
|
|
2010-03-08 11:19:52 +00:00
|
|
|
type specifies whether this certificate is for identification of a user
|
|
|
|
or a host using a SSH_CERT_TYPE_... value.
|
|
|
|
|
|
|
|
key id is a free-form text field that is filled in by the CA at the time
|
|
|
|
of signing; the intention is that the contents of this field are used to
|
|
|
|
identify the identity principal in log messages.
|
|
|
|
|
|
|
|
"valid principals" is a string containing zero or more principals as
|
|
|
|
strings packed inside it. These principals list the names for which this
|
|
|
|
certificate is valid; hostnames for SSH_CERT_TYPE_HOST certificates and
|
|
|
|
usernames for SSH_CERT_TYPE_USER certificates. As a special case, a
|
|
|
|
zero-length "valid principals" field means the certificate is valid for
|
|
|
|
any principal of the specified type. XXX DNS wildcards?
|
|
|
|
|
|
|
|
"valid after" and "valid before" specify a validity period for the
|
|
|
|
certificate. Each represents a time in seconds since 1970-01-01
|
|
|
|
00:00:00. A certificate is considered valid if:
|
2011-02-17 11:47:40 +00:00
|
|
|
|
|
|
|
valid after <= current time < valid before
|
2010-03-08 11:19:52 +00:00
|
|
|
|
2010-11-08 10:45:44 +00:00
|
|
|
criticial options is a set of zero or more key options encoded as
|
|
|
|
below. All such options are "critical" in the sense that an implementation
|
|
|
|
must refuse to authorise a key that has an unrecognised option.
|
2010-03-08 11:19:52 +00:00
|
|
|
|
2010-11-08 10:45:44 +00:00
|
|
|
extensions is a set of zero or more optional extensions. These extensions
|
|
|
|
are not critical, and an implementation that encounters one that it does
|
|
|
|
not recognise may safely ignore it.
|
2010-03-08 11:19:52 +00:00
|
|
|
|
2012-08-29 15:55:54 +00:00
|
|
|
Generally, critical options are used to control features that restrict
|
|
|
|
access where extensions are used to enable features that grant access.
|
|
|
|
This ensures that certificates containing unknown restrictions do not
|
|
|
|
inadvertently grant access while allowing new protocol features to be
|
|
|
|
enabled via extensions without breaking certificates' backwards
|
|
|
|
compatibility.
|
|
|
|
|
2010-11-08 10:45:44 +00:00
|
|
|
The reserved field is currently unused and is ignored in this version of
|
2010-03-08 11:19:52 +00:00
|
|
|
the protocol.
|
|
|
|
|
|
|
|
signature key contains the CA key used to sign the certificate.
|
2011-02-17 11:47:40 +00:00
|
|
|
The valid key types for CA keys are ssh-rsa, ssh-dss and the ECDSA types
|
|
|
|
ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, ecdsa-sha2-nistp521. "Chained"
|
2010-03-08 11:19:52 +00:00
|
|
|
certificates, where the signature key type is a certificate type itself
|
|
|
|
are NOT supported. Note that it is possible for a RSA certificate key to
|
2011-02-17 11:47:40 +00:00
|
|
|
be signed by a DSS or ECDSA CA key and vice-versa.
|
2010-03-08 11:19:52 +00:00
|
|
|
|
|
|
|
signature is computed over all preceding fields from the initial string
|
|
|
|
up to, and including the signature key. Signatures are computed and
|
|
|
|
encoded according to the rules defined for the CA's public key algorithm
|
2011-02-17 11:47:40 +00:00
|
|
|
(RFC4253 section 6.6 for ssh-rsa and ssh-dss, RFC5656 for the ECDSA
|
|
|
|
types).
|
2010-03-08 11:19:52 +00:00
|
|
|
|
2010-11-08 10:45:44 +00:00
|
|
|
Critical options
|
|
|
|
----------------
|
2010-03-08 11:19:52 +00:00
|
|
|
|
2010-11-08 10:45:44 +00:00
|
|
|
The critical options section of the certificate specifies zero or more
|
|
|
|
options on the certificates validity. The format of this field
|
2010-03-08 11:19:52 +00:00
|
|
|
is a sequence of zero or more tuples:
|
|
|
|
|
|
|
|
string name
|
|
|
|
string data
|
|
|
|
|
2010-11-08 10:45:44 +00:00
|
|
|
Options must be lexically ordered by "name" if they appear in the
|
2012-08-29 15:55:54 +00:00
|
|
|
sequence. Each named option may only appear once in a certificate.
|
2010-11-08 10:45:44 +00:00
|
|
|
|
|
|
|
The name field identifies the option and the data field encodes
|
|
|
|
option-specific information (see below). All options are
|
|
|
|
"critical", if an implementation does not recognise a option
|
2010-03-08 11:19:52 +00:00
|
|
|
then the validating party should refuse to accept the certificate.
|
|
|
|
|
2010-11-08 10:45:44 +00:00
|
|
|
The supported options and the contents and structure of their
|
2010-03-08 11:19:52 +00:00
|
|
|
data fields are:
|
|
|
|
|
|
|
|
Name Format Description
|
|
|
|
-----------------------------------------------------------------------------
|
|
|
|
force-command string Specifies a command that is executed
|
|
|
|
(replacing any the user specified on the
|
|
|
|
ssh command-line) whenever this key is
|
|
|
|
used for authentication.
|
|
|
|
|
2010-11-08 10:45:44 +00:00
|
|
|
source-address string Comma-separated list of source addresses
|
|
|
|
from which this certificate is accepted
|
|
|
|
for authentication. Addresses are
|
|
|
|
specified in CIDR format (nn.nn.nn.nn/nn
|
|
|
|
or hhhh::hhhh/nn).
|
|
|
|
If this option is not present then
|
|
|
|
certificates may be presented from any
|
|
|
|
source address.
|
|
|
|
|
|
|
|
Extensions
|
|
|
|
----------
|
|
|
|
|
|
|
|
The extensions section of the certificate specifies zero or more
|
|
|
|
non-critical certificate extensions. The encoding and ordering of
|
2012-08-29 15:55:54 +00:00
|
|
|
extensions in this field is identical to that of the critical options,
|
|
|
|
as is the requirement that each name appear only once.
|
|
|
|
|
2010-11-08 10:45:44 +00:00
|
|
|
If an implementation does not recognise an extension, then it should
|
|
|
|
ignore it.
|
|
|
|
|
|
|
|
The supported extensions and the contents and structure of their data
|
|
|
|
fields are:
|
|
|
|
|
|
|
|
Name Format Description
|
|
|
|
-----------------------------------------------------------------------------
|
2010-03-08 11:19:52 +00:00
|
|
|
permit-X11-forwarding empty Flag indicating that X11 forwarding
|
|
|
|
should be permitted. X11 forwarding will
|
2010-11-08 10:45:44 +00:00
|
|
|
be refused if this option is absent.
|
2010-03-08 11:19:52 +00:00
|
|
|
|
|
|
|
permit-agent-forwarding empty Flag indicating that agent forwarding
|
|
|
|
should be allowed. Agent forwarding
|
|
|
|
must not be permitted unless this
|
2010-11-08 10:45:44 +00:00
|
|
|
option is present.
|
2010-03-08 11:19:52 +00:00
|
|
|
|
|
|
|
permit-port-forwarding empty Flag indicating that port-forwarding
|
2010-11-08 10:45:44 +00:00
|
|
|
should be allowed. If this option is
|
2010-03-08 11:19:52 +00:00
|
|
|
not present then no port forwarding will
|
|
|
|
be allowed.
|
|
|
|
|
|
|
|
permit-pty empty Flag indicating that PTY allocation
|
|
|
|
should be permitted. In the absence of
|
2010-11-08 10:45:44 +00:00
|
|
|
this option PTY allocation will be
|
2010-03-08 11:19:52 +00:00
|
|
|
disabled.
|
|
|
|
|
|
|
|
permit-user-rc empty Flag indicating that execution of
|
|
|
|
~/.ssh/rc should be permitted. Execution
|
|
|
|
of this script will not be permitted if
|
2010-11-08 10:45:44 +00:00
|
|
|
this option is not present.
|
2010-03-08 11:19:52 +00:00
|
|
|
|
2012-08-29 15:55:54 +00:00
|
|
|
$OpenBSD: PROTOCOL.certkeys,v 1.9 2012/03/28 07:23:22 djm Exp $
|