History log of /openbsd/usr.bin/ssh/PROTOCOL.krl (Results 1 – 7 of 7)
Revision Date Author Comments
# a63bc561 17-Jul-2023 djm <djm@openbsd.org>

remove vestigal support for KRL signatures

When the KRL format was originally defined, it included support for
signing of KRL objects. However, the code to sign KRLs and verify KRL
signatues was nev

remove vestigal support for KRL signatures

When the KRL format was originally defined, it included support for
signing of KRL objects. However, the code to sign KRLs and verify KRL
signatues was never completed in OpenSSH.

Now, some years later, we have SSHSIG support in ssh-keygen that is
more general, well tested and actually works. So this removes the
semi-finished KRL signing/verification support from OpenSSH and
refactors the remaining code to realise the benefit - primarily, we
no longer need to perform multiple parsing passes over KRL objects.

ok markus@

show more ...


# 95561aef 17-Jul-2023 djm <djm@openbsd.org>

Support for KRL extensions.

This defines wire formats for optional KRL extensions and implements
parsing of the new submessages. No actual extensions are supported at
this point.

ok markus


# 76f3571a 12-Sep-2018 djm <djm@openbsd.org>

allow key revocation by SHA256 hash and allow ssh-keygen to create KRLs
using SHA256/base64 key fingerprints; ok markus@


# 27a1722d 10-Apr-2018 djm <djm@openbsd.org>

lots of typos in comments/docs. Patch from Karsten Weiss after checking
with codespell tool (https://github.com/lucasdemarchi/codespell)


# 5604398d 30-Jan-2015 djm <djm@openbsd.org>

permit KRLs that revoke certificates by serial number or key ID
without scoping to a particular CA; ok markus@


# 8fa65b3f 18-Jan-2013 djm <djm@openbsd.org>

RCD IDs help us keep portable in synch


# bc6ad73f 17-Jan-2013 djm <djm@openbsd.org>

add support for Key Revocation Lists (KRLs). These are a compact way to
represent lists of revoked keys and certificates, taking as little as
a single bit of incremental cost to revoke a certificate

add support for Key Revocation Lists (KRLs). These are a compact way to
represent lists of revoked keys and certificates, taking as little as
a single bit of incremental cost to revoke a certificate by serial number.
KRLs are loaded via the existing RevokedKeys sshd_config option.

feedback and ok markus@

show more ...