Skip to content

Conversation

Rob-Hague
Copy link
Collaborator

@Rob-Hague Rob-Hague commented Sep 16, 2023

See #1174 and RFC 8332 for details.

closes #1174
closes #1145
closes #1116
closes #1105
closes #956
closes #825

It may also close the following:
#1141
#1025
#1003
#858
#845

@WojciechNagorski
Copy link
Collaborator

@Rob-Hague I've pushed some changes to this PR. Can you review this?

@Rob-Hague
Copy link
Collaborator Author

Thanks! I should have paid more attention to PrivateKeyFile. I will add test coverage for that. And I will review the other changes more closely and let you know.

@WojciechNagorski
Copy link
Collaborator

WojciechNagorski commented Sep 19, 2023

Thanks to removing PubkeyAcceptedAlgorithms from the config file we know that SSH.NET supports the latest version of OpenSSH without any hack (configuration).

/// Initializes a new instance of the <see cref="RsaDigitalSignature"/> class with the SHA-1 hash algorithm.
/// </summary>
/// <param name="rsaKey">The RSA key.</param>
public RsaDigitalSignature(RsaKey rsaKey)
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

how about adding [Obsolete("Comment")] and using always new constructor?

Copy link
Collaborator Author

@Rob-Hague Rob-Hague Sep 19, 2023

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I do not think it is necessary here

(but I don't mind)

@WojciechNagorski
Copy link
Collaborator

It looks that everything is ready. I have to look over IHostAlgorithmsProvider IPrivateKeySource

Copy link
Collaborator

@WojciechNagorski WojciechNagorski left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Great work! Without you, we definitely wouldn't have rsa-sha-256 and rsa-sha-512 in this release. I'm merging this PR as is, but I will change the approach for IHostAlgorithmsProvide in the next PR. I've done many tests and experiments and it turned out that this was not the best approach.

@Rob-Hague
Copy link
Collaborator Author

Rob-Hague commented Sep 23, 2023

Awesome. Your approach to IPrivateKeySource is better than mine, I was just overly cautious about breaking changes. Thanks

@et1975
Copy link

et1975 commented Sep 25, 2023

When are you thinking to release?

@WojciechNagorski
Copy link
Collaborator

This week or next.

@dominikamann
Copy link

dominikamann commented Sep 29, 2023

@WojciechNagorski I am very grateful about this release :) It will help us a lot. Thank you!

@dominikamann
Copy link

I tested it with the current development branch. But it is still not working for me. Over console window with ssh root@xyz it works fine.

grafik

Exception in ClientAuthentication.cs:
grafik

Do you have any Idea?

Thank you all!

@Rob-Hague
Copy link
Collaborator Author

Rob-Hague commented Sep 29, 2023

Can you step through PrivateKeyAuthenticationMethod.Authenticate to see what algorithms are being used?

What are the algorithms returned in KeyExchangeInitMessage.Process?

edit: your key path also says ed25519. Are you sure this is related to rsa?

@dominikamann
Copy link

Thank you ... sure

grafik

grafik

grafik

@Rob-Hague
Copy link
Collaborator Author

Your key is an ed25519 so I would suggest that it is not related to this PR.

Would you mind opening another issue and pasting the result of ssh console command with "-v" (verbose) argument?

@YohanSciubukgian
Copy link

This week or next.

Do you have any update to share on the delivery timeline please ?

@WojciechNagorski
Copy link
Collaborator

WojciechNagorski commented Oct 6, 2023

@YohanSciubukgian
I hope so that it will work. I'm waiting for one thing from @drieseng.

If it doesn't work out this week, I'll do it at the beginning of next week, regardless of the thing I'm waiting for.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

5 participants