Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Feature Request: Support Host-Key-Certificates #416

Open
maximilian-maisel-bl opened this issue Dec 17, 2024 · 0 comments
Open

Feature Request: Support Host-Key-Certificates #416

maximilian-maisel-bl opened this issue Dec 17, 2024 · 0 comments
Labels
enhancement New feature or request

Comments

@maximilian-maisel-bl
Copy link

I'd like to use this SSH client library to connect to a dynamic group of devices
at work which are identified through SSH host certificates on first connection
instead of traditional static host-keys. The certificate and certificate
public-key is known to the application in the SSH format.

In this mode, the server uses host key algorithms suffixed with
-cert-v01@openssh.com like:

These host key algorithms are currently not supported by russh which causes either

  • A fallback to static hostkeys which will fail during verification
    since the application does not know all possible host keys beforehand.
  • Failure of the connection attempt if no non-certificate based hostkey algorithm is
    offered by the server.

A possible implementation of this feature could pass the received host-certificate to
the check_server_key handler where it has to be verified by the application that
the signature vylid and from a known CA, e.g. through the method
ssh_key::certificate::Certificate.validate.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

No branches or pull requests

2 participants