-
Notifications
You must be signed in to change notification settings - Fork 218
Description
Proposed Change
As a developer
I want to use host_256_fingerprint on desired-lrp for checksumming the SSH keys if present
so that when CAPI requests a desired-lrps with SHA256, diego-ssh uses a more secure hashing algorithm
Context
Previously we have tried to be clever and use the length of the fingerprint to determine the hashing algorithm in one and two attempts. This implementation requires diego-release to have been updated to support SHA256 before capi-release can send out the SHA256 fingerprint. Since capi-release is first in deployment order, this means that in order to get this feature, we'd have to have a multiple deployments. This shortcoming could be avoided if capi just added a new field host_256_fingerprint to the desired LRP and diego-ssh used that field if present and if not, it would fallback to the old behavior.
Implementation
Revert the following PRs
and re-implement the logic to instead of using length to determine the hashing algorithm, use the host_256_fingerprint field for SHA256 and fallback to fingerprint and length if the value is empty.
Acceptance criteria
Scenario: Before deploying the changes introduced in this PR
Given I have deployed a CF with this change
Then I can cf ssh into the app using the old SHA1 hashing algorithm
Scenario: After deploying the changes introduced in this PR
Given I have deployed a CF with this change
Then I can cf ssh into the app using the SHA256 hashing algorithm
Related links
Metadata
Metadata
Assignees
Labels
Type
Projects
Status