-
Notifications
You must be signed in to change notification settings - Fork 78
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Added OpenSSH 8.5/8.5p1 KexAlgorithms Support #192
Conversation
Ok, but what is the state of usage on that ? I mean, if the majority of Arch users still use a version previous to this one (and according to the date I think so), we should ensure compatibility with them for a certain amount of time. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Can you add a release check to ensure compatibility with previous Arch versions ?
As proposed, compatibility with older OpenSSH versions on Arch Linux is now ensured.
Since Arch Linux is not the only supported rolling release system, compatibility should also be ensured on the other platforms as a precautionary measure, shouldn't it? |
Indeed, it would be very great ! Thank you. |
For most platforms (including Alpine and openSUSE), the operating system version is used to derive the OpenSSH version. Why is the OpenSSH version itself not primarily used for this? ssh-baseline/libraries/ssh_crypto.rb Line 110 in d2346c9
I'm asking because the current master already uses a subversion to determine the correct key exchange algorithms for Alpine and openSUSE. I want to avoid making the change unnecessarily complicated, confusing or not being in line with best practice. |
That may be because of RedHat, they like to backport stuff without changing the version number of packages. see ssh-baseline/libraries/ssh_crypto.rb Lines 157 to 161 in d2346c9
and https://www.redhat.com/en/blog/what-backporting-and-how-does-it-apply-rhel-and-other-red-hat-products |
I have now grouped the validation of the key exchange algorithms for Alpine, Arch, Fedora and openSUSE, as no difference seems to exist there due to the lack of backports. Finally, I tested my changes using Vagrant for all 4 operating systems on different versions and could not find any error. So everything should be fine now. However, all CI/CD verifications fail. According to the details, this does not seem to be due to my code changes. |
No, the failures are not because of you. I'm trying to find out, why tihs happens. It started a few days ago and I cannot pinpoint any change or problem with our repo or workflow. My guess would be something with the Gem source (packagecloud.io). I will need to do some further investigation. |
I found a fix for the Ci issue. #194 If you do a merge or rebase things will be working. |
Signed-off-by: Lukas Zorn <[email protected]>
Signed-off-by: Lukas Zorn <[email protected]>
Signed-off-by: Lukas Zorn <[email protected]>
Signed-off-by: Lukas Zorn <[email protected]>
Signed-off-by: Lukas Zorn <[email protected]>
Signed-off-by: Lukas Zorn <[email protected]>
Signed-off-by: Lukas Zorn <[email protected]>
Signed-off-by: Lukas Zorn <[email protected]>
Done. |
Let's go !! |
OpenSSH 8.5 was released on 2021-03-03 and was officially made available for Arch Linux on 2021-03-04 17:09 UTC. The previous key exchange method
[email protected]
is replaced with[email protected]
in this release. Consequently, thessh_crypto.rb
library has to be updated.