-
Notifications
You must be signed in to change notification settings - Fork 4
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support new key types #346
Comments
I never thought about supporting this type of keys, but It seems easy to include them, so I'm going to take a look in the next weeks to implement, at least, a PoC. There are several places to change the support for "ed25519" keys, not only the validation. But your link to regex expressions will be definitely worth. Feel free to contribute to it... |
Hi @nemchik I've added the support for Let me know how it works 🙏🏼 |
I've just attempted to test this out (sorry for the delay) and it seems I am unable to create a new ed25519 key or import an existing ed25519 key. Just to provide as much info as possible, here is what I did:
|
The key I am trying to use is:
I also tried with the key you linked:
and got the same error |
Hi @nemchik Both keys are working using the code that resides in the Can you follow these instructions? I want to be sure that is not something related your system. |
I am using the provided docker compose. I initially setup my environment using the instructions you linked. Per my comment, after the setup the only thing I have done outside of the instructions is |
I repeated the steps in my comment from earlier and it seemed like the composer step ran more actions than previous (I assume it updated dependencies). After that I was able to successfully add my ed25519 key! One thing I noticed is the SSH public key is displayed in the UI with an incorrect comment. No matter what key is added, the comment is always Note that when I added the first key (top screenshot) I entered it as exactly:
and the page then shows it as:
The comment is really only cosmetic, but useful if you use it to identify which machine the key was created on and/or user accounts or email addresses. |
As you have already said, the key comment (
I'm going to implement the first one in #353 and maybe we can discuss the second one in the future. |
Is your feature request related to a problem? Please describe.
Currently only
ssh-rsa
key types are supported by ssham. There are a handful of other valid key types.Describe the solution you'd like
Specifically, I would like to see support added for
ed25519
key types. There are alsosk-
prefixed key types, which are generated using security keys, such as Yubikeys. These types of keys should be allowed to be imported, but not created within ssham (since creation would have to be done with the security key attached to the machine using a special flag with thessh-keygen
command).The key types can be validated using regular expressions, as described here https://github.com/nemchik/ssh-key-regex
Describe alternatives you've considered
Not using ssham 😦
All of our keys are currently
ed25519
rather thanrsa
and we'd like to try out ssham, but don't want to downgrade key types.Additional context
I searched the repo and didn't really see where keys were being checked to confirm they are valid, but I received a message in the UI:
So I can see there is a check happening.
The text was updated successfully, but these errors were encountered: