Replies: 3 comments 7 replies
-
It's probably less that, more that it's an RSA key. They're theoretically supported since #450, but TBH it's a pretty untested flow. The keychain access stuff isn't particularly applicable to the smartcard API – Secretive actually doesn't create any keys on smart cards and relies on management apps like YubiKey Manager to do that. |
Beta Was this translation helpful? Give feedback.
-
@maxgoedjen i now understand how this happens. it appears that your supposition regarding the immature support for RSA keys is correct, the macOS Security Framework (aka the Keychain API) represents EC keys in binary form, which is the same as the way OpenSSH represents them. unfortunately, that's not so lucky for RSA. the Keychain API represents RSA keys in ASN.1 DER encoding, but OpenSSH represents them as a sequence of two OpenSSH let me know what you think about that. any chance this is something you are willing to address? i might be able to submit a PR to address this -- but it might take me some time to come up to speed on the code enough to submit a worthy change. |
Beta Was this translation helpful? Give feedback.
-
any thoughts @maxgoedjen? 🙏 |
Beta Was this translation helpful? Give feedback.
-
i'm using secretive with the
Personal Identity verification diver
using theKey For PIV Authentication
tossh
.i have been trying to understand why this happens (and how to fix it):
the key is accepted by the server but not used by
ssh
. ultimately, i think the answer may be inREADME.md
:i think this means that
ssh
can't read the key and therefore i won't be able tossh
using the ssh public key returned by Secretive (viassh-add -L
). am i missing g anything?Beta Was this translation helpful? Give feedback.
All reactions