Re: Re: u2f seed

[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

 



On 01/03/2020 05:34 PM, James Bottomley wrote:
> There's nothing in the current ssh public key based process that can
> present remote information to the local client.

Remote information *external to the SSH authentication procedure
itself*. IIUC, at the point where the client starts to authenticate,
both sides are already in agreement what the server's (hopefully unique)
pubkey is, that the server has demonstrated possession of the matching
private key, and which server-side account the client asks to access.

In other words, we may not be able to come up with a wrapped key that is
unique to the combo of target account and token and kept secret from
everyone else, but we can hash us a long-lived ID for the target account
alone that at least promises to have some good randomness, if poor
secrecy. Would that, compared to doing the token auth essentially
memoryless/"first time ever" every time, buy us some worthwhile
top-level properties? *Beyond* the "hold, that's a *different* pubkey
the server has now!" check that the known_host cacheing already allows
*sans* the U2F part?

Regards,
-- 
Jochen Bern
Systemingenieur

Binect GmbH
Robert-Koch-Straße 9
64331 Weiterstadt

Attachment: smime.p7s
Description: S/MIME Cryptographic Signature

_______________________________________________
openssh-unix-dev mailing list
openssh-unix-dev@xxxxxxxxxxx
https://lists.mindrot.org/mailman/listinfo/openssh-unix-dev

[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

[Index of Archives]     [Linux ARM Kernel]     [Linux ARM]     [Linux Omap]     [Fedora ARM]     [IETF Annouce]     [Security]     [Bugtraq]     [Linux]     [Linux OMAP]     [Linux MIPS]     [ECOS]     [Asterisk Internet PBX]     [Linux API]

  Powered by Linux