[GitHub] [mina-sshd] FliegenKLATSCH edited a comment on issue #119: Add support for openssh host key certificates

2020-04-18 Thread GitBox
FliegenKLATSCH edited a comment on issue #119: Add support for openssh host key 
certificates
URL: https://github.com/apache/mina-sshd/pull/119#issuecomment-615926894
 
 
   Please note commit 
https://github.com/apache/mina-sshd/pull/119/commits/a8cdbdec3fe6c7c3e248ec1854b4f0adc27c5863
 This relates to [SSHD-895](https://issues.apache.org/jira/browse/SSHD-895), if 
client and server negotiated e.g. rsa-sha512 the signature verification would 
fail with ssh-rsa retrieved from `KeyUtils.getKeyType`.
   If all is fine now for your, should be ready to merge from my side. Many 
thanks for your fast reviews! I really appreciate this.


This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.
 
For queries about this service, please contact Infrastructure at:
us...@infra.apache.org


With regards,
Apache Git Services

-
To unsubscribe, e-mail: dev-unsubscr...@mina.apache.org
For additional commands, e-mail: dev-h...@mina.apache.org



[GitHub] [mina-sshd] FliegenKLATSCH edited a comment on issue #119: Add support for openssh host key certificates

2020-04-18 Thread GitBox
FliegenKLATSCH edited a comment on issue #119: Add support for openssh host key 
certificates
URL: https://github.com/apache/mina-sshd/pull/119#issuecomment-615926894
 
 
   Please note commit 
https://github.com/apache/mina-sshd/pull/119/commits/a8cdbdec3fe6c7c3e248ec1854b4f0adc27c5863
 This relates to [SSHD-895](https://issues.apache.org/jira/browse/SSHD-895), if 
client and server negotiated e.g. rsa-sha512 the signature verification would 
fail with ssh-rsa retrieved from `KeyUtils.getKeyType`.
   If all is fine now for you, should be ready to merge from my side. Many 
thanks for your fast reviews! I really appreciate this.


This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.
 
For queries about this service, please contact Infrastructure at:
us...@infra.apache.org


With regards,
Apache Git Services

-
To unsubscribe, e-mail: dev-unsubscr...@mina.apache.org
For additional commands, e-mail: dev-h...@mina.apache.org



[GitHub] [mina-sshd] FliegenKLATSCH edited a comment on issue #119: Add support for openssh host key certificates

2020-04-18 Thread GitBox
FliegenKLATSCH edited a comment on issue #119: Add support for openssh host key 
certificates
URL: https://github.com/apache/mina-sshd/pull/119#issuecomment-615926894
 
 
   Please note commit 
https://github.com/apache/mina-sshd/pull/119/commits/a8cdbdec3fe6c7c3e248ec1854b4f0adc27c5863
 This relates to [SSHD-895](https://issues.apache.org/jira/browse/SSHD-895), if 
client and server negotiated e.g. rsa-sha512 the signature verification would 
fail with ssh-rsa retrieved from `KeyUtils.getKeyType`.
   If all is fine now for your ,should be ready to merge from my side. Many 
thanks for your fast reviews! I really appreciate this.


This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.
 
For queries about this service, please contact Infrastructure at:
us...@infra.apache.org


With regards,
Apache Git Services

-
To unsubscribe, e-mail: dev-unsubscr...@mina.apache.org
For additional commands, e-mail: dev-h...@mina.apache.org



[GitHub] [mina-sshd] FliegenKLATSCH commented on issue #119: Add support for openssh host key certificates

2020-04-18 Thread GitBox
FliegenKLATSCH commented on issue #119: Add support for openssh host key 
certificates
URL: https://github.com/apache/mina-sshd/pull/119#issuecomment-615926894
 
 
   Please note commit 
https://github.com/apache/mina-sshd/pull/119/commits/a8cdbdec3fe6c7c3e248ec1854b4f0adc27c5863
 This relates to [SSHD-895](https://issues.apache.org/jira/browse/SSHD-895), if 
client and server negotiated e.g. rsa-sha512 the signature verification would 
fail with ssh-rsa retrieved from `KeyUtils.getKeyType`.


This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.
 
For queries about this service, please contact Infrastructure at:
us...@infra.apache.org


With regards,
Apache Git Services

-
To unsubscribe, e-mail: dev-unsubscr...@mina.apache.org
For additional commands, e-mail: dev-h...@mina.apache.org



[jira] [Created] (SSHD-981) Implement no-flow-control SFTP extension

2020-04-18 Thread Guillaume Nodet (Jira)
Guillaume Nodet created SSHD-981:


 Summary: Implement no-flow-control SFTP extension
 Key: SSHD-981
 URL: https://issues.apache.org/jira/browse/SSHD-981
 Project: MINA SSHD
  Issue Type: Improvement
Reporter: Guillaume Nodet
Assignee: Guillaume Nodet
 Fix For: 2.4.1






--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: dev-unsubscr...@mina.apache.org
For additional commands, e-mail: dev-h...@mina.apache.org



[jira] [Created] (SSHD-980) Make the SFTP Api cleaner by moving the implementation classes into the non public package

2020-04-18 Thread Guillaume Nodet (Jira)
Guillaume Nodet created SSHD-980:


 Summary: Make the SFTP Api cleaner by moving the implementation 
classes into the non public package
 Key: SSHD-980
 URL: https://issues.apache.org/jira/browse/SSHD-980
 Project: MINA SSHD
  Issue Type: Improvement
Reporter: Guillaume Nodet
Assignee: Guillaume Nodet
 Fix For: 2.4.1






--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: dev-unsubscr...@mina.apache.org
For additional commands, e-mail: dev-h...@mina.apache.org



[jira] [Created] (SSHD-979) Rework SFTP streams so that we can send or receive as much data as possible

2020-04-18 Thread Guillaume Nodet (Jira)
Guillaume Nodet created SSHD-979:


 Summary: Rework SFTP streams so that we can send or receive as 
much data as possible
 Key: SSHD-979
 URL: https://issues.apache.org/jira/browse/SSHD-979
 Project: MINA SSHD
  Issue Type: Improvement
Reporter: Guillaume Nodet
Assignee: Guillaume Nodet
 Fix For: 2.4.1


The streams use a synchronous InputStream or OutputStream on the channel which 
blocks for the server response whenever flush is called.  This cause a huge 
drop of the transfer rate compared to other SFTP implementations.

 

This work is sponsored by Buddy [https://buddy.works/]



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: dev-unsubscr...@mina.apache.org
For additional commands, e-mail: dev-h...@mina.apache.org



[jira] [Commented] (SSHD-978) Autoformat source code instead of using checkstyle

2020-04-18 Thread Lyor Goldstein (Jira)


[ 
https://issues.apache.org/jira/browse/SSHD-978?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=17086504#comment-17086504
 ] 

Lyor Goldstein commented on SSHD-978:
-

Can you provide some more information on this issue ? I am not sure it is 
feasible - my main concern is how this would work in coordination with the 
IDE(s) (let's say Eclipse and Intellij).

> Autoformat source code instead of using checkstyle
> --
>
> Key: SSHD-978
> URL: https://issues.apache.org/jira/browse/SSHD-978
> Project: MINA SSHD
>  Issue Type: Task
>Reporter: Guillaume Nodet
>Assignee: Guillaume Nodet
>Priority: Major
> Fix For: 2.4.1
>
>




--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: dev-unsubscr...@mina.apache.org
For additional commands, e-mail: dev-h...@mina.apache.org



[jira] [Comment Edited] (SSHD-895) Add support for RSA + SHA-256/512 signatures

2020-04-18 Thread Lyor Goldstein (Jira)


[ 
https://issues.apache.org/jira/browse/SSHD-895?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=17086503#comment-17086503
 ] 

Lyor Goldstein edited comment on SSHD-895 at 4/18/20, 3:39 PM:
---

The comment simply says that there are servers that refuse to authenticate if 
the public key algorithms listed by the clients are not supported by the 
server. In other words, even if eventually the negotiated algorithm would be 
{{ssh-rsa}} some servers refuse to authenticate if the client lists algorithms 
they do not support. It contradicts SSH protocol behavior of course, but we 
want the default settings of MINA SSHD to provide the widest possible support - 
which means the most common "denominator".


was (Author: lgoldstein):
The comment simply says that there are servers that refuse to authenticate if 
the public key algorithms listed by the clients are not supported by the 
server. In other words, even if eventually the negotiated algorithm would be 
`ssh-rsa` some servers refuse to authenticate if the client lists algorithms 
they do not support. It contradicts SSH protocol behavior of course, but we 
want the default settings of MINA SSHD to provide the widest possible support - 
which means the most common "denominator".

> Add support for RSA + SHA-256/512 signatures
> 
>
> Key: SSHD-895
> URL: https://issues.apache.org/jira/browse/SSHD-895
> Project: MINA SSHD
>  Issue Type: Improvement
>Affects Versions: 2.3.0
>Reporter: Lyor Goldstein
>Assignee: Lyor Goldstein
>Priority: Major
> Fix For: 2.3.0
>
>
> See https://tools.ietf.org/html/rfc8332 - *Note:*
> {quote}
> Servers that accept rsa-sha2-* signatures for client authentication
> SHOULD implement the extension negotiation mechanism defined in
> [RFC8308], including especially the "server-sig-algs" extension.
> {quote}



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: dev-unsubscr...@mina.apache.org
For additional commands, e-mail: dev-h...@mina.apache.org



[jira] [Commented] (SSHD-895) Add support for RSA + SHA-256/512 signatures

2020-04-18 Thread Lyor Goldstein (Jira)


[ 
https://issues.apache.org/jira/browse/SSHD-895?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=17086503#comment-17086503
 ] 

Lyor Goldstein commented on SSHD-895:
-

The comment simply says that there are servers that refuse to authenticate if 
the public key algorithms listed by the clients are not supported by the 
server. In other words, even if eventually the negotiated algorithm would be 
`ssh-rsa` some servers refuse to authenticate if the client lists algorithms 
they do not support. It contradicts SSH protocol behavior of course, but we 
want the default settings of MINA SSHD to provide the widest possible support - 
which means the most common "denominator".

> Add support for RSA + SHA-256/512 signatures
> 
>
> Key: SSHD-895
> URL: https://issues.apache.org/jira/browse/SSHD-895
> Project: MINA SSHD
>  Issue Type: Improvement
>Affects Versions: 2.3.0
>Reporter: Lyor Goldstein
>Assignee: Lyor Goldstein
>Priority: Major
> Fix For: 2.3.0
>
>
> See https://tools.ietf.org/html/rfc8332 - *Note:*
> {quote}
> Servers that accept rsa-sha2-* signatures for client authentication
> SHOULD implement the extension negotiation mechanism defined in
> [RFC8308], including especially the "server-sig-algs" extension.
> {quote}



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: dev-unsubscr...@mina.apache.org
For additional commands, e-mail: dev-h...@mina.apache.org



[jira] [Commented] (SSHD-895) Add support for RSA + SHA-256/512 signatures

2020-04-18 Thread FliegenKLATSCH (Jira)


[ 
https://issues.apache.org/jira/browse/SSHD-895?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=17086449#comment-17086449
 ] 

FliegenKLATSCH commented on SSHD-895:
-

I don't understand the reason for not enabling rsaSHA512  and rsaSHA256 per 
default. Could you enlighten me?

Does the comment 
{code:java}
Implementation experience has shown that there are servers that apply
authentication penalties to clients attempting public key algorithms
that the SSH server does not support.{code}
apply, if we first negotiate the algorithm with the server?

I understand it the way that there are penalties if the client just tries an 
algorithm which was not negotiated?

And I am not sure if the client would try a sha2 variant if the negotiated 
algorithm is `ssh-rsa`?

> Add support for RSA + SHA-256/512 signatures
> 
>
> Key: SSHD-895
> URL: https://issues.apache.org/jira/browse/SSHD-895
> Project: MINA SSHD
>  Issue Type: Improvement
>Affects Versions: 2.3.0
>Reporter: Lyor Goldstein
>Assignee: Lyor Goldstein
>Priority: Major
> Fix For: 2.3.0
>
>
> See https://tools.ietf.org/html/rfc8332 - *Note:*
> {quote}
> Servers that accept rsa-sha2-* signatures for client authentication
> SHOULD implement the extension negotiation mechanism defined in
> [RFC8308], including especially the "server-sig-algs" extension.
> {quote}



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: dev-unsubscr...@mina.apache.org
For additional commands, e-mail: dev-h...@mina.apache.org



[jira] [Created] (SSHD-978) Autoformat source code instead of using checkstyle

2020-04-18 Thread Guillaume Nodet (Jira)
Guillaume Nodet created SSHD-978:


 Summary: Autoformat source code instead of using checkstyle
 Key: SSHD-978
 URL: https://issues.apache.org/jira/browse/SSHD-978
 Project: MINA SSHD
  Issue Type: Task
Reporter: Guillaume Nodet
Assignee: Guillaume Nodet
 Fix For: 2.4.1






--
This message was sent by Atlassian Jira
(v8.3.4#803005)

-
To unsubscribe, e-mail: dev-unsubscr...@mina.apache.org
For additional commands, e-mail: dev-h...@mina.apache.org



[GitHub] [mina-sshd] lgoldstein commented on issue #119: Add support for openssh host key certificates

2020-04-18 Thread GitBox
lgoldstein commented on issue #119: Add support for openssh host key 
certificates
URL: https://github.com/apache/mina-sshd/pull/119#issuecomment-615619181
 
 
   >> OpenSSH actually does a fallback to the plain host key, maybe we should 
do the same instead of aborting the connection if the certificate is invalid. 
Makes especially sense if the certificate is expired, you still want to be able 
to connect..
   
   I can live with that - just a suggestion - you can make the behavior 
configurable via a property that you can retrieve from the session (default can 
be whatever you  decide).
   
   >> I am currently on the unit tests, having some issues with RSA key 
mismatch exception... 512 vs 256 .. need to investigate further...
   
   Great -  will wait for you to let me know when you feel the code is ready 
for more review and merging.


This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.
 
For queries about this service, please contact Infrastructure at:
us...@infra.apache.org


With regards,
Apache Git Services

-
To unsubscribe, e-mail: dev-unsubscr...@mina.apache.org
For additional commands, e-mail: dev-h...@mina.apache.org