Skip to content

Commit

Permalink
[SSHD-1024] Allow other signatures to use rsa variants
Browse files Browse the repository at this point in the history
  • Loading branch information
FliegenKLATSCH authored and Lyor Goldstein committed Jul 2, 2020
1 parent a5c8f32 commit b9ddc14
Showing 1 changed file with 12 additions and 14 deletions.
26 changes: 12 additions & 14 deletions sshd-core/src/main/java/org/apache/sshd/client/kex/DHGClient.java
Original file line number Diff line number Diff line change
Expand Up @@ -192,21 +192,19 @@ protected void verifyCertificate(Session session, OpenSshCertificate openSshKey)
String keyAlg = KeyUtils.getKeyType(signatureKey);
String keyId = openSshKey.getId();

if (KeyPairProvider.SSH_RSA_CERT.equals(openSshKey.getKeyType())) {
// allow sha2 signatures for legacy reasons
String variant = openSshKey.getSignatureAlg();
if ((!GenericUtils.isEmpty(variant))
&& KeyPairProvider.SSH_RSA.equals(KeyUtils.getCanonicalKeyType(variant))) {
if (log.isDebugEnabled()) {
log.debug("verifyCertificate({})[id={}] Allowing to use variant {} instead of {}",
session, keyId, variant, keyAlg);
}
keyAlg = variant;
} else {
throw new SshException(
SshConstants.SSH2_DISCONNECT_KEY_EXCHANGE_FAILED,
"Found invalid signature alg " + variant + " for key ID=" + keyId);
// allow sha2 signatures for legacy reasons
String variant = openSshKey.getSignatureAlg();
if ((!GenericUtils.isEmpty(variant))
&& KeyPairProvider.SSH_RSA.equals(KeyUtils.getCanonicalKeyType(variant))) {
if (log.isDebugEnabled()) {
log.debug("verifyCertificate({})[id={}] Allowing to use variant {} instead of {}",
session, keyId, variant, keyAlg);
}
keyAlg = variant;
} else {
throw new SshException(
SshConstants.SSH2_DISCONNECT_KEY_EXCHANGE_FAILED,
"Found invalid signature alg " + variant + " for key ID=" + keyId);
}

Signature verif = ValidateUtils.checkNotNull(
Expand Down

0 comments on commit b9ddc14

Please sign in to comment.