> On Jul 1, 2020, at 02:15, Nikos Mavrogiannopoulos <n...@redhat.com> wrote:
> 
> On Tue, Jun 30, 2020 at 1:59 AM Felipe Gasper <fel...@felipegasper.com> 
> wrote:
>> 
>> Hello,
>> 
>>        I want to rig up a simple authentication based on SSH keys but over a 
>> preexisting TLS connection.
>> 
>>        Since TLS already handles the encryption, would the authentication be 
>> as simple as verifying a decode of a string that the public key encodes?
>> 
>>        Is there any prior art for this?
>> 
>>        (I realize this isn’t really on-topic for this list, but I’m not sure 
>> where else to ask … ?)
> 
> If you have a TLS channel you could use the raw public key
> authentication (rfc7250) feature of TLS to authenticate each party. In
> that case it doesn't matter whether you have SSH keys or any other
> types of keys, you only need to read them and feed them to your
> implementation as raw public keys. That way you stay within the TLS
> protocol design.

The problem is that we don’t know at TLS time which authentication mechanism 
will be used: password, or SSH key. Otherwise, yeah, this would be perfect.

-F

Reply via email to