[
https://issues.apache.org/jira/browse/SSHD-1260?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
]
Thomas Wolf closed SSHD-1260.
-----------------------------
Fix Version/s: 2.15.0
Resolution: Fixed
Support for Bouncy Castle ed25519 was added in [Github PR
639|https://github.com/apache/mina-sshd/pull/639]. Users can decide whether or
not they want to use the net.i2p library. If net.i2p.crypto.eddsa is not
present at run-time, Bouncy Castle (if present) will be used for ed25519.
> EdDSA dependency net.i2p.crypto ed25519 signatures are malleable
> ----------------------------------------------------------------
>
> Key: SSHD-1260
> URL: https://issues.apache.org/jira/browse/SSHD-1260
> Project: MINA SSHD
> Issue Type: Dependency upgrade
> Reporter: Dominik Schneider
> Priority: Major
> Fix For: 2.15.0
>
>
> To use ed25519 keys with the SSHD server it is necessary to use the
> net.i2p.crypto dependency. This dependency has a security flaw as it uses
> malleable ed25519 signatures as described in this github
> [issue|[https://github.com/str4d/ed25519-java/issues/82]].
> This issue was detected in the context of a paper which checked several
> ed25519 implementations for security issues. In Table 5 of the paper, they
> state that this dependency is not SUF-CMA compliant in contrast to the Bouncy
> Castle implementation, which is SUF-CMA compliant.
> Besides, it appears that the ed22519-java project is not longer maintained,
> as the issue is fixed in the main project of i2p, but not in this separated
> crypto library. As Bouncy Castle is already supported in SSHD and is SUF-CMA
> compliant, it would be very useful that SSHD supports the Bouncy Castle
> implementation of ed25519. This issue is related to SSHD-985 and SSHD-988.
--
This message was sent by Atlassian Jira
(v8.20.10#820010)
---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]