-
-
Notifications
You must be signed in to change notification settings - Fork 940
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
aes256-ctr not supported for private keys #742
Comments
This PR includes this: #614 |
Seems we need to have a release so other programs can update their dependencies against the new release |
When will this fix be available? |
No nuget released announced yet, but you can git pull and conpile
…Sent from my iPhone
On Jan 7, 2022, at 5:35 PM, lilhoser ***@***.***> wrote:
When will this fix be available?
—
Reply to this email directly, view it on GitHub, or unsubscribe.
Triage notifications on the go with GitHub Mobile for iOS or Android.
You are receiving this because you are subscribed to this thread.
|
I don't suppose you have an update on the next release to fix this issue? |
I'm using the main branch (version 2020.0.1) so I also get this error. I know it's fixed in the develop branch, but I decided to not use a password on the key right now, which avoids the error. Hopefully a new main release will get put out soon. |
This specific cipher is currently not implemented in the case of decrypting OpenSSH V1 keys: https://github.com/sshnet/SSH.NET/blob/2020.0.2/src/Renci.SshNet/PrivateKeyFile.cs#L427-L455 The code simply assumes the encryption is either |
If you want to use ed25519 keys you may change the encryption cipher using the -Z parameter
|
If you want to change passphrase and cipher of an existing ed25519 key
enter the passphrase as prompts. |
Is there a release date planned for this fix? |
I think a release should be made. It's been a while. |
So basically, you have to force the cipher to be aes256-cbc? |
Fixed by #614 which is in the 2023.0.0 release |
Hi,
Newer OpenSSH versions seem to create private keys enciphered with aes256-ctr by default, at least for ed25519 keys, making them impossible to load with SSH.NET. Given than ssh-keygen doesn't provide a handy way to reencode the key, it's pretty annoying.
Stacktrace of an attempt at loading such a key:
The text was updated successfully, but these errors were encountered: