Control: forwarded 795636 https://bugs.gnupg.org/gnupg/issue2075
Control: tags 795636 + upstream

Hi Brian--

On Sat 2015-08-15 23:45:09 +0200, brian m. carlson wrote:
>
> I added the following ECDSA SSH key earlier today (with GnuPG 2.1.6).
> gpg-agent added it to sshcontrol with an incorrect MD5 fingerprint:
>
>   ecdsa-sha2-nistp384 
> AAAAE2VjZHNhLXNoYTItbmlzdHAzODQAAAAIbmlzdHAzODQAAABhBIcIk0jxxbWcr5s6TK2CNnH8qJRfnSe7pWCHohPnIOKqDMqPJcEDjntMXukXjpnzMVv/ToBvMqCK49uztCzPUiF0kIBhziVvyGkZqrUrJd2BD2wedrpCTfY//dA9viKLrQ==
>  bmc@vauxhall
>
>   # ECDSA key added on: 2015-08-15 20:51:39
>   # MD5 Fingerprint:  bf:b2:5c:1e:be:8a:63:74:19:50:bf:23:21:3c:ff:5e
>   0D3ADB5BC29D85ECCA7397095962CB389A1C734D 0
>
> Considering the simplicity of the algorithm[0], I'm not sure why this is
> broken, but it does appear to be.  This is confusing, but otherwise
> purely aesthetic.  The key functions correctly and can be used normally.

thanks for this report.  It looks like this is true only for NIST 384.
it doesn't happen for 256 or 521.

I've reported it upstream at the URL above.

> (Once OpenSSH 7.0 hits unstable, you might consider putting the SHA-256
> fingerprint in instead, but that's another bug report.)

yep, we'll work on that one separately :)

all the best,

    --dkg

Attachment: signature.asc
Description: PGP signature

Reply via email to