Klaus Nguetsa created SSHD-1259:
-----------------------------------

             Summary: DefaultKnownHostsServerKeyVerifier not checking all Key 
algorithms
                 Key: SSHD-1259
                 URL: https://issues.apache.org/jira/browse/SSHD-1259
             Project: MINA SSHD
          Issue Type: Bug
    Affects Versions: 2.8.0
            Reporter: Klaus Nguetsa


Assuming I have the following know_hosts file containing twice the public key 
of the same host but with different algorithms.:

 
{code:java}
lserver1 ssh-dss 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
#
lserver1 ecdsa-sha2-nistp256 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX{code}
 

 

During the connection when I use DefaultKnownHostsServerKeyVerifier  to verify 
the keys, if the target host presents a ecdsa-sha2-nistp256 key, the 
verification will fail because DefaultKnownHostsServerKeyVerifier  seems to 
match to the first occurence of the hostname in the know_host file. Therefore 
It will match the key _lserver1 ssh-dss XXXXXXXXXXXX..._ and the comparison to 
the same key but with ecdsa-sha2-nistp256 algorithm presented by the target 
host will fail. Shouldn't it iterate through the file until the right 
combination (hostname, algorithm) is found?  This way it could check with 
lserver1 ecdsa-sha2-nistp256 XXXX..... instead of lserver1 ssh-dss XXXXX......

This works fine with openssh. 

Thanks

 



--
This message was sent by Atlassian Jira
(v8.20.1#820001)

---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to