-
Notifications
You must be signed in to change notification settings - Fork 17.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
x/crypto/ssh: add support for hostkeys@openssh.com #37245
Comments
I'm interested in taking this on, as it would be helpful for our implementations. I've reviewed the extension details in the openssh PROTOCOL file and it's relatively light on specifics, but seems to be enough to implement it. One question I have on the |
Hi @aphistic, I'm a little short on time right now but this is also on my TODO. |
Hey @drakkan! Is this something where you'd want to collaborate on it, or I should put it off? Do you have any thoughts on the implementation of it that I should implement? We currently have a fork of Since the recent release of |
Hi @aphistic, yes I would like to collobarate but I'm currently busy with other things, if this is urgent for you feel free to start. I haven't had time to think about the implementation details yet. I just added this issue to my TODO and I marked it as low priority Is your crypto fork public? I think it would be a good starting point. I recently became a crypto/ssh maintainer and I'm trying to help implement the common features we all need 😄 I'm currently working on these issues |
Hello, I would like to contribute and help here if possible, I am also interested in this feature. @aphistic can you share the host key implementation that you have? |
Hello, I propose the following API changes:
No server-side API changes are needed because the We can also add something like |
Change https://go.dev/cl/559055 mentions this issue: |
Help with testing the above CL and thoughts on it are greatly appreciated. Thank you! |
CL updated with new API
The purpose of these changes is to allow clients to get public keys only after servers prove ownership. Also updated the check in
|
we should make this
|
Also, |
@FiloSottile thank you, CL updated
|
Proposed API
cc @golang/proposal-review |
This proposal has been added to the active column of the proposals project |
Any comments on the API in #37245 (comment)? I assume the empty struct is not really empty but has unexported fields. |
@rsc, I confirm that the struct has unexported fields used to immplement the public methods Here are the struct fields in the proposed CL
The public key is not exposed directly to prevent users from trusting it without sending the |
Based on the discussion above, this proposal seems like a likely accept. The proposal details are in #37245 (comment). |
No change in consensus, so accepted. 🎉 The proposal details are in #37245 (comment). |
The
hostkeys@openssh.com
extension lets a server notify a client of all its host keys to enable a smooth transition if they have UpdateHostKeys enabled. We should offer it server-side.The text was updated successfully, but these errors were encountered: