Commit message (Collapse) | Author | Age | Files | Lines | |
---|---|---|---|---|---|
* | Merge pull request #883 from sshock/fix-cert-sig-valid-check | Miklós Fazekas | 2022-10-18 | 2 | -7/+30 |
|\ | | | | | Fix certificate signature valid check | ||||
| * | Add tests for a cert with a SHA512 signature | Phillip Hellewell | 2022-10-11 | 1 | -5/+28 |
| | | |||||
| * | Fix certificate signature_valid? check | Phillip Hellewell | 2022-10-11 | 1 | -2/+2 |
|/ | | | | | Need to pass in :host_key option so it will verify using the correct signature algorithm instead of always using SHA1. | ||||
* | Bump actions/checkout to v3 | mishina | 2022-07-22 | 3 | -4/+4 |
| | |||||
* | andrewmcodes/rubocop-linter-action is deprecated | mishina | 2022-07-22 | 1 | -5/+8 |
| | |||||
* | Update version.rbv7.0.1 | Miklós Fazekas | 2022-06-26 | 1 | -1/+1 |
| | |||||
* | Merge pull request #866 from terceiro/drop-debugging-statement | Miklós Fazekas | 2022-06-26 | 1 | -1/+0 |
|\ | | | | | Channel: drop debugging statement | ||||
| * | Channel: drop debugging statement | Antonio Terceiro | 2022-05-19 | 1 | -1/+0 |
| | | | | | | | | | | | | | | After upgrading to net-ssh 7.0.0, I get several lines like `E:TERM V:xterm` printed in the terminal when connecting to hosts. I'm assuming this slipped by mistake in commit 5e79b6687771 ("Fixed integration test opensshd kill") | ||||
* | | Update version.rbv7.0.0 | Miklós Fazekas | 2022-06-26 | 1 | -1/+1 |
|/ | |||||
* | v 7.0.0.beta1 release preparev7.0.0.beta1 | Miklós Fazekas | 2022-04-30 | 1 | -2/+2 |
| | |||||
* | Fix #854 regression | Florian Wininger | 2022-04-29 | 1 | -5/+1 |
| | |||||
* | Fix unit tests for OpenSSL 3 | Florian Wininger | 2022-04-29 | 3 | -2/+14 |
| | |||||
* | fix rubocop issues | Florian Wininger | 2022-04-29 | 5 | -44/+64 |
| | |||||
* | diffie-hellman: create the key by generating the PEM file | Simon Chopin | 2022-04-29 | 1 | -17/+17 |
| | | | | | | | | | | This makes the code compatible with OpenSSL 3.0. However, an issue with this is that it is not possible anymore to ensure a specific size for the private key, as indicated in the inline comment. v2: avoid PKey.generate_key on older releases (< 2.7) Co-authored-by: Lucas Kanashiro <lucas.kanashiro@canonical.com> | ||||
* | Use OpenSSL::PKey::EC.generate static method | Simon Chopin | 2022-04-29 | 6 | -12/+12 |
| | | | | | | | | | | | Migrate all instances of the pattern EC.new(foo).generate_key to EC.generate(foo), as the old pattern isn't supported when using OpenSSL 3.0, since one is not allowed to mess with the internal data of already created objects now. The new API has been introduced in Ruby 2.4. Co-authored-by: Lucas Kanashiro <lucas.kanashiro@canonical.com> | ||||
* | transport: create EC keys by loading PEM data directly | Simon Chopin | 2022-04-29 | 1 | -3/+11 |
| | | | | | | | | | The OpenSSL 3.0 changes don't allow for us to modify the private key details directly, and there are no dedicated constructors as of Ruby 3.0, so we need to actually create a PEM certificate in-memory and load that instead. Co-authored-by: Lucas Kanashiro <lucas.kanashiro@canonical.com> | ||||
* | buffer: create DSA keys by loading PEM data directly | Simon Chopin | 2022-04-29 | 2 | -23/+36 |
| | | | | | | | | | | | | | The OpenSSL 3.0 changes don't allow for us to modify the private key details directly, and there are no dedicated constructors as of Ruby 3.0, so we need to actually create a PEM certificate in-memory and load that instead. To add insult to injury, contrary to other types of keys such as RSA, we need to actually build the full PEM data and not just pack the numbers in a simple sequence, making the code even a bit more complicated. Co-authored-by: Lucas Kanashiro <lucas.kanashiro@canonical.com> | ||||
* | buffer: create RSA keys by loading PEM data directly | Simon Chopin | 2022-04-29 | 3 | -24/+25 |
| | | | | | | | | | The OpenSSL 3.0 changes don't allow for us to modify the private key details directly, and there are no dedicated constructors as of Ruby 3.0, so we need to actually create a PEM certificate in-memory and load that instead. Co-authored-by: Lucas Kanashiro <lucas.kanashiro@canonical.com> | ||||
* | tests: Enable legacy providers if using OpenSSL 3.0 | Simon Chopin | 2022-04-29 | 2 | -0/+31 |
| | | | | | | | Quite a few tests rely on outdated algorithms that have been relegated to the legacy provider in OpenSSL 3.0. `rake test` now loads a custom OpenSSL configuration file to enable said legacy provider, which is usually disabled by default. | ||||
* | update rubocop config | Florian Wininger | 2022-04-29 | 2 | -16/+25 |
| | |||||
* | Test all kex | Florian Wininger | 2022-04-20 | 1 | -0/+16 |
| | |||||
* | Update tests suite | Florian Wininger | 2022-04-15 | 2 | -7/+21 |
| | |||||
* | Fix a typo | Florian Wininger | 2022-04-15 | 1 | -4/+4 |
| | |||||
* | Read ecdsa private key in openssh format | Martin Sander | 2022-04-12 | 2 | -0/+69 |
| | | | | Fixes #657. | ||||
* | Add unit-test for openssl 3 | Florian Wininger | 2022-04-12 | 2 | -0/+31 |
| | |||||
* | Generate all DSA keys with 1024 bits | Simon Chopin | 2022-04-12 | 5 | -11/+11 |
| | | | | | | 512bits keys are refused in newer OpenSSL libraries as too weak. Co-authored-by: Lucas Kanashiro <lucas.kanashiro@canonical.com> | ||||
* | openssl: DSA: don't hardcode expected signature size | Antonio Terceiro | 2022-04-12 | 1 | -1/+2 |
| | | | | | | | | | | | The default value of the Q parameters for DSA keys changed in Ruby OpenSSL 3.0.0, and that causes DSA signatures to be longer by default. This change might have been accidental, and this may be reverted; see https://github.com/ruby/openssl/issues/483 This changes the check for the signature length to not be against a hardcoded expected lenght, but against the expected length as calculated from the Q parameter. | ||||
* | Update README.md | Florian Wininger | 2022-04-12 | 1 | -0/+6 |
| | |||||
* | Run only once unit tests | Florian Wininger | 2022-04-12 | 1 | -1/+3 |
| | |||||
* | Run test with docker | Florian Wininger | 2022-04-12 | 4 | -0/+75 |
| | |||||
* | Use ruby 2.6 and newer | Florian Wininger | 2022-04-12 | 1 | -1/+1 |
| | |||||
* | Configure rubocop for gh actions | Florian Wininger | 2022-04-12 | 3 | -94/+128 |
| | |||||
* | Run rubocop on the side | Florian Wininger | 2022-04-12 | 2 | -3/+13 |
| | |||||
* | Fix some nits | Florian Wininger | 2022-04-12 | 2 | -4/+1 |
| | |||||
* | Fix link | Florian Wininger | 2022-04-12 | 1 | -1/+1 |
| | |||||
* | enhance readme | Florian Wininger | 2022-04-12 | 2 | -19/+1 |
| | |||||
* | Remove travis configuration files | Florian Wininger | 2022-04-12 | 1 | -51/+0 |
| | |||||
* | Add support of ruby 3.1 and drop 2.5 | Florian Wininger | 2022-04-11 | 3 | -19/+33 |
| | |||||
* | Merge pull request #855 from zzambers/delegate-fix | Miklós Fazekas | 2022-04-05 | 1 | -0/+1 |
|\ | | | | | known_hosts.rb: Added missing require delegate | ||||
| * | known_hosts.rb: Added missing require delegate | Zdenek Zambersky | 2022-04-05 | 1 | -0/+1 |
|/ | |||||
* | Merge pull request #850 from boblail/lail/expand-paths-to-identity-agent | Miklós Fazekas | 2022-03-28 | 2 | -2/+7 |
|\ | | | | | Support `~` in the path to the SSH agent's unix socket | ||||
| * | Support `~` in the path to the SSH agent's unix socket | Bob Lail | 2022-03-04 | 2 | -2/+7 |
| | | |||||
* | | Added support for RSA client authentication with SHA-2 | Zdenek Zambersky | 2021-11-18 | 9 | -27/+161 |
| | | |||||
* | | Update rubocop version | Florian Wininger | 2021-10-25 | 1 | -1/+1 |
| | | |||||
* | | Fix rubocop coding style. | Florian Wininger | 2021-10-25 | 94 | -545/+475 |
| | | | | | | | | Lot of spacing issues :) | ||||
* | | Fix rubucop config | Florian Wininger | 2021-10-25 | 2 | -126/+146 |
| | | |||||
* | | Disable codecov | Florian Wininger | 2021-10-25 | 1 | -2/+2 |
| | | |||||
* | | Update expired certsv6.3.0.beta1 | Miklós Fazekas | 2021-08-10 | 1 | -8/+8 |
| | | |||||
* | | 6.3.0.beta1 release | Miklós Fazekas | 2021-08-10 | 2 | -2/+3 |
| | | |||||
* | | Merge pull request #765 from dax/fix_translated_strict_host_key_checking | Miklós Fazekas | 2021-08-10 | 2 | -12/+42 |
|\ \ | | | | | | | Fix StrictHostKeyChecking ssh config parameter translation |