summaryrefslogtreecommitdiff
path: root/PROTOCOL.certkeys
diff options
context:
space:
mode:
Diffstat (limited to 'PROTOCOL.certkeys')
-rw-r--r--PROTOCOL.certkeys21
1 files changed, 14 insertions, 7 deletions
diff --git a/PROTOCOL.certkeys b/PROTOCOL.certkeys
index aa6f5ae4c..42aa8c2a1 100644
--- a/PROTOCOL.certkeys
+++ b/PROTOCOL.certkeys
@@ -192,12 +192,13 @@ compatibility.
192The reserved field is currently unused and is ignored in this version of 192The reserved field is currently unused and is ignored in this version of
193the protocol. 193the protocol.
194 194
195signature key contains the CA key used to sign the certificate. 195The signature key field contains the CA key used to sign the
196The valid key types for CA keys are ssh-rsa, ssh-dss and the ECDSA types 196certificate. The valid key types for CA keys are ssh-rsa,
197ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, ecdsa-sha2-nistp521. "Chained" 197ssh-dss, ssh-ed25519 and the ECDSA types ecdsa-sha2-nistp256,
198certificates, where the signature key type is a certificate type itself 198ecdsa-sha2-nistp384, ecdsa-sha2-nistp521. "Chained" certificates, where
199are NOT supported. Note that it is possible for a RSA certificate key to 199the signature key type is a certificate type itself are NOT supported.
200be signed by a DSS or ECDSA CA key and vice-versa. 200Note that it is possible for a RSA certificate key to be signed by a
201Ed25519 or ECDSA CA key and vice-versa.
201 202
202signature is computed over all preceding fields from the initial string 203signature is computed over all preceding fields from the initial string
203up to, and including the signature key. Signatures are computed and 204up to, and including the signature key. Signatures are computed and
@@ -223,6 +224,9 @@ option-specific information (see below). All options are
223"critical", if an implementation does not recognise a option 224"critical", if an implementation does not recognise a option
224then the validating party should refuse to accept the certificate. 225then the validating party should refuse to accept the certificate.
225 226
227Custom options should append the originating author or organisation's
228domain name to the option name, e.g. "my-option@example.com".
229
226No critical options are defined for host certificates at present. The 230No critical options are defined for host certificates at present. The
227supported user certificate options and the contents and structure of 231supported user certificate options and the contents and structure of
228their data fields are: 232their data fields are:
@@ -254,6 +258,9 @@ as is the requirement that each name appear only once.
254If an implementation does not recognise an extension, then it should 258If an implementation does not recognise an extension, then it should
255ignore it. 259ignore it.
256 260
261Custom options should append the originating author or organisation's
262domain name to the option name, e.g. "my-option@example.com".
263
257No extensions are defined for host certificates at present. The 264No extensions are defined for host certificates at present. The
258supported user certificate extensions and the contents and structure of 265supported user certificate extensions and the contents and structure of
259their data fields are: 266their data fields are:
@@ -284,4 +291,4 @@ permit-user-rc empty Flag indicating that execution of
284 of this script will not be permitted if 291 of this script will not be permitted if
285 this option is not present. 292 this option is not present.
286 293
287$OpenBSD: PROTOCOL.certkeys,v 1.10 2016/05/03 10:27:59 djm Exp $ 294$OpenBSD: PROTOCOL.certkeys,v 1.12 2017/05/31 04:29:44 djm Exp $