-
Bug
-
Resolution: Done
-
Critical
-
fuse-7.8-GA
-
None
-
False
-
False
-
%
-
-
+
-
Undefined
-
-
When using `camel-ssh` with an SSH provider that supports only EdDSA certificate signing, Camel cannot verify the server's key. Depending on how the route is configured, this may be a fatal exception, or the route may continue with warnings, like this:
2021-02-11 16:07:10,380 | WARN | dec6]-nio2-thread-31 | .c.s.ResourceBasedSSHKeyVerifier | 1103 - org.apache.camel.camel-ssh - 2.21.0.fuse-770013-redhat-00001 | Could not find matching key for client session, connection will continue anyway due to configuration 2021-02-11 16:07:10,478 | WARN | edec6]-nio2-thread-4 | .a.s.c.s.ClientConnectionService | 185 - org.apache.sshd.core - 1.7.0 | globalRequest(ClientConnectionService[ClientSessionImpl[iesb1006@esb-int1.hrs.siemens.com/139.25.75.109:22]])[hostkeys-00@openssh.com, want-reply=false] failed (SshException) to process: EdDSA provider not supported
In either case, the server's key is unverified.
It seems that the `ssh-core` SSH client implementation is hardcoded to load the class `net.i2p.crypto.eddsa`, which is available in a JAR at `mvn:net.i2p.crypto/eddsa`. However, dependency conflicts are preventing this JAR being installed on Karaf and, even if that weren't the case, I'm not sure that the classloader architecture would allow the class to be loaded.
- relates to
-
ENTESB-16007 Red Hat Fuse - JSCH compatibility with ED25519 private key
- Closed
- links to