On Fri, Jul 20, 2012 at 02:10:05PM -0700, TSU wrote:

> Yesterday I observed on the Git IRC a conversation that SSH keys were not 
> required for SSL sessions( would have responded if my Freednode account 
> wasn't having problems). 
> 
> Aside from the fact (AFAIK) github only supports SSH for key testing and 
> nothing else, I was under the impression these same keys are re-used for 
> authenticating SSL sessions as well, implementing a kind of 2-factor 
> authentication (SSL keys to prove your machine, username/password to prove 
> your human identity).
> 
> Are SSH keys required or not for SSL connections?
I don't quite understand the question, but let's just try some things
clear -- maybe this will help you.

First, SSH and SSL have nothing in common except for the word [S]ecure
and the naturally following fact they secure something (SSH secures the
[SH]ell access and SSL secures the [S]ocket [L]ayer).  These are
completely disjoint protocols invented for differing needs.

These protocols also use different approach for what you call "keys".
SSH uses "shallow" approach to keys: a client generates a pair of
keys -- one public and one private, -- then transfers the public part to
the server and adds it to an *explicit* list of trusted keys.  Hence the
server either trusts that key or not; nothing else.  The client actually
does the similar thing by checking the server's key's fingerprint to see
if it's known and trusted.
SSL uses hierarchical approach to its "keys", which it calls
"certificates": this stuff involves certification authotities (CAs) and
trust chains they create.  The whole topic is too deep to cover here but
the end result is that usually either side or both explicitly trust some
CA, and through this fact they tust each other.
In either case, the wire format of the keys used by these protocols and
the semantics of their usage is different.

One last thing to note is that while SSL/TLS is based solely around
those X.509 certificates, SSH defines various methods for authentication
of the client to the server: besides the "pubkey" method we've just
discussed, it supports the very popular "keyboard interactive" method,
Kerberos authentication and GSSAPI (SSPI in Microsoft lingo) which can
also do Kerberos.

So no, the same keys can't be used for both SSL and SSH.

As to github, I think they implement two modes:
1) SSH keys are used to access the repo via SSH.  You associate your SSH
   key with your github account and so when you're trying to
   authenticate the next time, Git knows who you are from your key.
2) SSL is used to simply encrypt the conversation with the server, and
   then HTTP (which tunnelled over SSL) uses simple password-based
   authentication method called "basic" to verify your identity.
   See https://github.com/blog/642-smart-http-support for hints on this.

-- 
You received this message because you are subscribed to the Google Groups "Git 
for human beings" group.
To post to this group, send email to git-users@googlegroups.com.
To unsubscribe from this group, send email to 
git-users+unsubscr...@googlegroups.com.
For more options, visit this group at 
http://groups.google.com/group/git-users?hl=en.

Reply via email to