<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version  -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
]>


<rfc ipr="trust200902" docName="draft-josefsson-sshsig-format-01" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="SSHSIG">Lightweight Secure Shell (SSH) Signature Format</title>

    <author fullname="Sebastian Kinne">
      <organization></organization>
      <address>
        <email>skinne@google.com</email>
      </address>
    </author>
    <author fullname="Damien Miller">
      <organization>OpenSSH</organization>
      <address>
        <email>djm@mindrot.org</email>
      </address>
    </author>
    <author fullname="Simon Josefsson" role="editor">
      <organization></organization>
      <address>
        <email>simon@josefsson.org</email>
      </address>
    </author>

    <date year="2025" month="March" day="21"/>

    <area>IETF</area>
    <workgroup>Secure Shell Maintenance</workgroup>
    <keyword>SSH</keyword> <keyword>Secure Shell</keyword> <keyword>Signature</keyword> <keyword>secsh</keyword>

    <abstract>


<t>This document describes a lightweight SSH Signature format that is
compatible with SSH keys and wire formats.</t>



    </abstract>

    <note title="About This Document" removeInRFC="true">
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-josefsson-sshsig-format/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        SSHM Working Group mailing list (<eref target="mailto:ssh@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/ssh/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://gitlab.com/jas/ietf-sshsig-format"/>.</t>
    </note>


  </front>

  <middle>


<section anchor="introduction"><name>Introduction</name>

<t>Secure Shell (SSH) <xref target="RFC4251"></xref> is a secure remote-login protocol. It
provides for an extensible variety of public key algorithms for
identifying servers and users to one another.</t>

<t>The SSH key and signature formats have found uses outside of the
interactive online SSH protocol itself.  This document specify these
formats.</t>

<t>At present, only detached and armored signatures are supported.</t>

</section>
<section anchor="conventions-used-in-this-document"><name>Conventions Used In This Document</name>

<t>The descriptions of key and signature formats use the notation
introduced in <xref target="RFC4251"></xref>.</t>

<t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

</section>
<section anchor="armored-format"><name>Armored format</name>

<t>The Armored SSH signatures consist of a header, a base64 encoded blob,
and a footer.</t>

<t>The header is the string "-----BEGIN SSH SIGNATURE-----" followed by a
newline. The footer is the string "-----END SSH SIGNATURE-----"
immediately after a newline.</t>

<t>The header <bcp14>MUST</bcp14> be present at the start of every signature.  Files
containing the signature <bcp14>MUST</bcp14> start with the header.  Likewise, the
footer <bcp14>MUST</bcp14> be present at the end of every signature.</t>

<t>The base64 encoded blob <bcp14>SHOULD</bcp14> be broken up by newlines every 76
characters.</t>

<t>Example:</t>

<figure><artwork><![CDATA[
-----BEGIN SSH SIGNATURE-----
U1NIU0lHAAAAAQAAADMAAAALc3NoLWVkMjU1MTkAAAAgJKxoLBJBivUPNTUJUSslQTt2hD
jozKvHarKeN8uYFqgAAAADZm9vAAAAAAAAAFMAAAALc3NoLWVkMjU1MTkAAABAKNC4IEbt
Tq0Fb56xhtuE1/lK9H9RZJfON4o6hE9R4ZGFX98gy0+fFJ/1d2/RxnZky0Y7GojwrZkrHT
FgCqVWAQ==
-----END SSH SIGNATURE-----
]]></artwork></figure>

</section>
<section anchor="blob-format"><name>Blob format</name>

<figure><artwork><![CDATA[
<CODE BEGINS>
#define MAGIC_PREAMBLE "SSHSIG"
#define SIG_VERSION    0x01

byte[6] MAGIC_PREAMBLE
 uint32 SIG_VERSION
 string publickey
 string namespace
 string reserved
 string hash_algorithm
 string signature
<CODE ENDS>
]]></artwork></figure>

<t>The publickey field <bcp14>MUST</bcp14> contain the serialisation of the public key
used to make the signature using the usual SSH encoding rules, i.e
<xref target="RFC4253"></xref>, <xref target="RFC5656"></xref>, <xref target="RFC8709"></xref>, etc.</t>

<t>Verifiers <bcp14>MUST</bcp14> reject signatures with versions greater than those they
support.</t>

<t>The purpose of the namespace value is to specify a unambiguous
interpretation domain for the signature, e.g. file signing.  This
prevents cross-protocol attacks caused by signatures intended for one
intended domain being accepted in another.  The namespace value <bcp14>MUST
NOT</bcp14> be the empty string.</t>

<t>The reserved value is present to encode future information (e.g. tags)
into the signature. Implementations should ignore the reserved field
if it is not empty.</t>

<t>Data to be signed is first hashed with the specified hash_algorithm.
This is done to limit the amount of data presented to the signature
operation, which may be of concern if the signing key is held in
limited or slow hardware or on a remote ssh-agent. The supported hash
algorithms are "sha256" and "sha512".</t>

<t>The signature itself is made using the SSH signature algorithm and
encoding rules for the chosen key type. For RSA signatures, the
signature algorithm must be "rsa-sha2-512" or "rsa-sha2-256" (i.e.
not the legacy RSA-SHA1 "ssh-rsa").</t>

<t>This blob is encoded as a string using the <xref target="RFC4253"></xref> encoding rules and
base64 encoded to form the middle part of the armored signature.</t>

</section>
<section anchor="signed-data-of-which-the-signature-goes-into-the-blob-above"><name>Signed Data, of which the signature goes into the blob above</name>

<figure><artwork><![CDATA[
<CODE BEGINS>
#define MAGIC_PREAMBLE "SSHSIG"

byte[6] MAGIC_PREAMBLE
 string namespace
 string reserved
 string hash_algorithm
 string H(message)
<CODE ENDS>
]]></artwork></figure>

<t>The preamble is the six-byte sequence "SSHSIG". It is included to
ensure that manual signatures can never be confused with any message
signed during SSH user or host authentication.</t>

<t>The reserved value is present to encode future information (e.g. tags)
into the signature. Implementations should ignore the reserved field
if it is not empty.</t>

<t>The data is concatenated and passed to the SSH signing function.</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>None</t>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>The security considerations of all referenced specifications are
inherited.</t>

<t>Cryptographic algorithms and parameters are usually broken or weakened
over time.  Implementers and users need to continously re-evaluate
that cryptographic algorithms continue to provide the expected level
of security.</t>

<t>Implementations has to follow best practices to avoid security
concerns, and users needs to continously re-evaulate implementations
for security vulnerabilities.</t>

<t>This signature format embeds the public key, which is usually already
available for a verifier to make trust decisions.  When verifying a
signature, care must be made to not unintentionally use the public key
within the signature for trust decisions.</t>

</section>
<section anchor="acknowledgments"><name>Acknowledgments</name>

<t>The text in this document is from <spanx style="verb">PROTOCOL.sshsig</spanx> from OpenSSH which
appears to have been contributed to by at least Sebastian Kinne,
Damien Miller, Markus Friedl, HARUYAMA Seigo, and Pedro Martelletto.</t>

</section>
<section anchor="implementation-status"><name>Implementation Status</name>

<t>This section records the status of known implementations of the
protocol defined by this specification at the time of posting of this
Internet-Draft, and is based on a proposal described in <xref target="RFC7942"></xref>.  The
description of implementations in this section is intended to assist
the IETF in its decision processes in progressing drafts to RFCs.
Please note that the listing of any individual implementation here
does not imply endorsement by the IETF.  Furthermore, no effort has
been spent to verify the information presented here that was supplied
by IETF contributors.  This is not intended as, and must not be
construed to be, a catalog of available implementations or their
features.  Readers are advised to note that other implementations may
exist.</t>

<t>According to <xref target="RFC7942"></xref>, "this will allow reviewers and working groups
to assign due consideration to documents that have the benefit of
running code, which may serve as evidence of valuable experimentation
and feedback that have made the implemented protocols more mature.  It
is up to the individual working groups to use this information as they
see fit</t>

<t>The following example projects maintain an implementation of this
protocol:</t>

<t><strong>OpenSSH</strong>: C implementation.</t>

<t>Website: https://www.openssh.com/</t>

<t><strong>SSHSIGLIB</strong>: Python implementation by Castedo Ellerman.</t>

<t>Website: https://gitlab.com/perm.pub/sshsiglib</t>

<t><strong>SSHSIGN-GO</strong>: Go implementation by Benjamin Pannell at SierraSoftworks.</t>

<t>Website: https://github.com/SierraSoftworks/sshsign-go</t>

<t><strong>SSHSIG</strong>: Go implementation by Hidde Beydals.</t>

<t>Website: https://github.com/hiddeco/sshsig</t>

<t><strong>GO-SSHSIG</strong>: Go implementation by Paul Tagliamonte.</t>

<t>Website: https://github.com/paultag/go-sshsig</t>

<t><strong>REKOR-PKI-SSH</strong>: Go implementation by Sigstore/Rekor.</t>

<t>Website: https://github.com/sigstore/rekor/tree/v1.0.1/pkg/pki/ssh</t>

</section>


  </middle>

  <back>

    <references title='Normative References'>



<reference anchor='RFC4251' target='https://www.rfc-editor.org/info/rfc4251'>
  <front>
    <title>The Secure Shell (SSH) Protocol Architecture</title>
    <author fullname='T. Ylonen' initials='T.' surname='Ylonen'/>
    <author fullname='C. Lonvick' initials='C.' role='editor' surname='Lonvick'/>
    <date month='January' year='2006'/>
    <abstract>
      <t>The Secure Shell (SSH) Protocol is a protocol for secure remote login and other secure network services over an insecure network. This document describes the architecture of the SSH protocol, as well as the notation and terminology used in SSH protocol documents. It also discusses the SSH algorithm naming system that allows local extensions. The SSH protocol consists of three major components: The Transport Layer Protocol provides server authentication, confidentiality, and integrity with perfect forward secrecy. The User Authentication Protocol authenticates the client to the server. The Connection Protocol multiplexes the encrypted tunnel into several logical channels. Details of these protocols are described in separate documents. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='4251'/>
  <seriesInfo name='DOI' value='10.17487/RFC4251'/>
</reference>

<reference anchor='RFC4253' target='https://www.rfc-editor.org/info/rfc4253'>
  <front>
    <title>The Secure Shell (SSH) Transport Layer Protocol</title>
    <author fullname='T. Ylonen' initials='T.' surname='Ylonen'/>
    <author fullname='C. Lonvick' initials='C.' role='editor' surname='Lonvick'/>
    <date month='January' year='2006'/>
    <abstract>
      <t>The Secure Shell (SSH) is a protocol for secure remote login and other secure network services over an insecure network.</t>
      <t>This document describes the SSH transport layer protocol, which typically runs on top of TCP/IP. The protocol can be used as a basis for a number of secure network services. It provides strong encryption, server authentication, and integrity protection. It may also provide compression.</t>
      <t>Key exchange method, public key algorithm, symmetric encryption algorithm, message authentication algorithm, and hash algorithm are all negotiated.</t>
      <t>This document also describes the Diffie-Hellman key exchange method and the minimal set of algorithms that are needed to implement the SSH transport layer protocol. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='4253'/>
  <seriesInfo name='DOI' value='10.17487/RFC4253'/>
</reference>

<reference anchor='RFC5656' target='https://www.rfc-editor.org/info/rfc5656'>
  <front>
    <title>Elliptic Curve Algorithm Integration in the Secure Shell Transport Layer</title>
    <author fullname='D. Stebila' initials='D.' surname='Stebila'/>
    <author fullname='J. Green' initials='J.' surname='Green'/>
    <date month='December' year='2009'/>
    <abstract>
      <t>This document describes algorithms based on Elliptic Curve Cryptography (ECC) for use within the Secure Shell (SSH) transport protocol. In particular, it specifies Elliptic Curve Diffie-Hellman (ECDH) key agreement, Elliptic Curve Menezes-Qu-Vanstone (ECMQV) key agreement, and Elliptic Curve Digital Signature Algorithm (ECDSA) for use in the SSH Transport Layer protocol. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='5656'/>
  <seriesInfo name='DOI' value='10.17487/RFC5656'/>
</reference>

<reference anchor='RFC8709' target='https://www.rfc-editor.org/info/rfc8709'>
  <front>
    <title>Ed25519 and Ed448 Public Key Algorithms for the Secure Shell (SSH) Protocol</title>
    <author fullname='B. Harris' initials='B.' surname='Harris'/>
    <author fullname='L. Velvindron' initials='L.' surname='Velvindron'/>
    <date month='February' year='2020'/>
    <abstract>
      <t>This document describes the use of the Ed25519 and Ed448 digital signature algorithms in the Secure Shell (SSH) protocol. Accordingly, this RFC updates RFC 4253.</t>
    </abstract>
  </front>
  <seriesInfo name='RFC' value='8709'/>
  <seriesInfo name='DOI' value='10.17487/RFC8709'/>
</reference>

<reference anchor='RFC2119' target='https://www.rfc-editor.org/info/rfc2119'>
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname='S. Bradner' initials='S.' surname='Bradner'/>
    <date month='March' year='1997'/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name='BCP' value='14'/>
  <seriesInfo name='RFC' value='2119'/>
  <seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>

<reference anchor='RFC8174' target='https://www.rfc-editor.org/info/rfc8174'>
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname='B. Leiba' initials='B.' surname='Leiba'/>
    <date month='May' year='2017'/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name='BCP' value='14'/>
  <seriesInfo name='RFC' value='8174'/>
  <seriesInfo name='DOI' value='10.17487/RFC8174'/>
</reference>




    </references>

    <references title='Informative References'>



<reference anchor='RFC7942' target='https://www.rfc-editor.org/info/rfc7942'>
  <front>
    <title>Improving Awareness of Running Code: The Implementation Status Section</title>
    <author fullname='Y. Sheffer' initials='Y.' surname='Sheffer'/>
    <author fullname='A. Farrel' initials='A.' surname='Farrel'/>
    <date month='July' year='2016'/>
    <abstract>
      <t>This document describes a simple process that allows authors of Internet-Drafts to record the status of known implementations by including an Implementation Status section. This will allow reviewers and working groups to assign due consideration to documents that have the benefit of running code, which may serve as evidence of valuable experimentation and feedback that have made the implemented protocols more mature.</t>
      <t>This process is not mandatory. Authors of Internet-Drafts are encouraged to consider using the process for their documents, and working groups are invited to think about applying the process to all of their protocol specifications. This document obsoletes RFC 6982, advancing it to a Best Current Practice.</t>
    </abstract>
  </front>
  <seriesInfo name='BCP' value='205'/>
  <seriesInfo name='RFC' value='7942'/>
  <seriesInfo name='DOI' value='10.17487/RFC7942'/>
</reference>




    </references>



  </back>

<!-- ##markdown-source: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-->

</rfc>

