Skip to content

Use host_256_fingerprint for diego-ssh #1014

@winkingturtle-vmw

Description

@winkingturtle-vmw

Proposed Change

As a developer
I want to use host_256_fingerprint on desired-lrp for checksumming the SSH keys if present
so that when CAPI requests a desired-lrps with SHA256, diego-ssh uses a more secure hashing algorithm

Context

Previously we have tried to be clever and use the length of the fingerprint to determine the hashing algorithm in one and two attempts. This implementation requires diego-release to have been updated to support SHA256 before capi-release can send out the SHA256 fingerprint. Since capi-release is first in deployment order, this means that in order to get this feature, we'd have to have a multiple deployments. This shortcoming could be avoided if capi just added a new field host_256_fingerprint to the desired LRP and diego-ssh used that field if present and if not, it would fallback to the old behavior.

Implementation

Revert the following PRs

and re-implement the logic to instead of using length to determine the hashing algorithm, use the host_256_fingerprint field for SHA256 and fallback to fingerprint and length if the value is empty.

Acceptance criteria

Scenario: Before deploying the changes introduced in this PR
Given I have deployed a CF with this change
Then I can cf ssh into the app using the old SHA1 hashing algorithm

Scenario: After deploying the changes introduced in this PR
Given I have deployed a CF with this change
Then I can cf ssh into the app using the SHA256 hashing algorithm

Related links

Metadata

Metadata

Assignees

No one assigned

    Type

    No type

    Projects

    Status

    Inbox

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions