19261079b7
Some notable changes, from upstream's release notes: - sshd(8): Remove support for obsolete "host/port" syntax. - ssh(1): When prompting whether to record a new host key, accept the key fingerprint as a synonym for "yes". - ssh-keygen(1): when acting as a CA and signing certificates with an RSA key, default to using the rsa-sha2-512 signature algorithm. - ssh(1), sshd(8), ssh-keygen(1): this release removes the "ssh-rsa" (RSA/SHA1) algorithm from those accepted for certificate signatures. - ssh-sk-helper(8): this is a new binary. It is used by the FIDO/U2F support to provide address-space isolation for token middleware libraries (including the internal one). - ssh(1): this release enables UpdateHostkeys by default subject to some conservative preconditions. - scp(1): this release changes the behaviour of remote to remote copies (e.g. "scp host-a:/path host-b:") to transfer through the local host by default. - scp(1): experimental support for transfers using the SFTP protocol as a replacement for the venerable SCP/RCP protocol that it has traditionally used. Additional integration work is needed to support FIDO/U2F in the base system. Deprecation Notice ------------------ OpenSSH will disable the ssh-rsa signature scheme by default in the next release. Reviewed by: imp MFC after: 1 month Relnotes: Yes Sponsored by: The FreeBSD Foundation Differential Revision: https://reviews.freebsd.org/D29985
101 lines
3.3 KiB
Plaintext
101 lines
3.3 KiB
Plaintext
This document describes a lightweight SSH Signature format
|
|
that is compatible with SSH keys and wire formats.
|
|
|
|
At present, only detached and armored signatures are supported.
|
|
|
|
1. Armored format
|
|
|
|
The Armored SSH signatures consist of a header, a base64
|
|
encoded blob, and a footer.
|
|
|
|
The header is the string "-----BEGIN SSH SIGNATURE-----"
|
|
followed by a newline. The footer is the string
|
|
"-----END SSH SIGNATURE-----" immediately after a newline.
|
|
|
|
The header MUST be present at the start of every signature.
|
|
Files containing the signature MUST start with the header.
|
|
Likewise, the footer MUST be present at the end of every
|
|
signature.
|
|
|
|
The base64 encoded blob SHOULD be broken up by newlines
|
|
every 76 characters.
|
|
|
|
Example:
|
|
|
|
-----BEGIN SSH SIGNATURE-----
|
|
U1NIU0lHAAAAAQAAADMAAAALc3NoLWVkMjU1MTkAAAAgJKxoLBJBivUPNTUJUSslQTt2hD
|
|
jozKvHarKeN8uYFqgAAAADZm9vAAAAAAAAAFMAAAALc3NoLWVkMjU1MTkAAABAKNC4IEbt
|
|
Tq0Fb56xhtuE1/lK9H9RZJfON4o6hE9R4ZGFX98gy0+fFJ/1d2/RxnZky0Y7GojwrZkrHT
|
|
FgCqVWAQ==
|
|
-----END SSH SIGNATURE-----
|
|
|
|
2. Blob format
|
|
|
|
#define MAGIC_PREAMBLE "SSHSIG"
|
|
#define SIG_VERSION 0x01
|
|
|
|
byte[6] MAGIC_PREAMBLE
|
|
uint32 SIG_VERSION
|
|
string publickey
|
|
string namespace
|
|
string reserved
|
|
string hash_algorithm
|
|
string signature
|
|
|
|
The publickey field MUST contain the serialisation of the
|
|
public key used to make the signature using the usual SSH
|
|
encoding rules, i.e RFC4253, RFC5656,
|
|
draft-ietf-curdle-ssh-ed25519-ed448, etc.
|
|
|
|
Verifiers MUST reject signatures with versions greater than those
|
|
they support.
|
|
|
|
The purpose of the namespace value is to specify a unambiguous
|
|
interpretation domain for the signature, e.g. file signing.
|
|
This prevents cross-protocol attacks caused by signatures
|
|
intended for one intended domain being accepted in another.
|
|
The namespace value MUST NOT be the empty string.
|
|
|
|
The reserved value is present to encode future information
|
|
(e.g. tags) into the signature. Implementations should ignore
|
|
the reserved field if it is not empty.
|
|
|
|
Data to be signed is first hashed with the specified hash_algorithm.
|
|
This is done to limit the amount of data presented to the signature
|
|
operation, which may be of concern if the signing key is held in limited
|
|
or slow hardware or on a remote ssh-agent. The supported hash algorithms
|
|
are "sha256" and "sha512".
|
|
|
|
The signature itself is made using the SSH signature algorithm and
|
|
encoding rules for the chosen key type. For RSA signatures, the
|
|
signature algorithm must be "rsa-sha2-512" or "rsa-sha2-256" (i.e.
|
|
not the legacy RSA-SHA1 "ssh-rsa").
|
|
|
|
This blob is encoded as a string using the RFC4253 encoding
|
|
rules and base64 encoded to form the middle part of the
|
|
armored signature.
|
|
|
|
|
|
3. Signed Data, of which the signature goes into the blob above
|
|
|
|
#define MAGIC_PREAMBLE "SSHSIG"
|
|
|
|
byte[6] MAGIC_PREAMBLE
|
|
string namespace
|
|
string reserved
|
|
string hash_algorithm
|
|
string H(message)
|
|
|
|
The preamble is the six-byte sequence "SSHSIG". It is included to
|
|
ensure that manual signatures can never be confused with any message
|
|
signed during SSH user or host authentication.
|
|
|
|
The reserved value is present to encode future information
|
|
(e.g. tags) into the signature. Implementations should ignore
|
|
the reserved field if it is not empty.
|
|
|
|
The data is concatenated and passed to the SSH signing
|
|
function.
|
|
|
|
$OpenBSD: PROTOCOL.sshsig,v 1.4 2020/08/31 00:17:41 djm Exp $
|