-
Notifications
You must be signed in to change notification settings - Fork 9.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
SSH communicator does not send SHA2 signatures #27768
Comments
Hi @ecky-l, The logs you present here seem to indicate that the two ssh connections are using different keys for authentication. The log shows Can you confirm what type of key is being chosen when using How many keys are loaded in the agent? If you did not include the full logs from the authentication, there may have been too many key attempts by the client if the desired key was too far down the list. Thanks! |
Hello @jbardin , I have only one key in the agent and it is exactly the only one that is configured in the core account on the machine. There is another ed25519 key in my ~./ssh directory, which could theoretically be picked up for a login attempt, but its a password locked ssh-ed25519 key - and neither did I get a password prompt nor are there any complaints in the log about this key type. It is also definitely not in the agent. If that matters: I use the ssh enabled gpg-agent with a yubikey, and the ssh key is a subkey of my gpg key. So the ssh-agent is in reality the gpg-agent and just appears as the ssh-agent. But that works otherwise without problems... |
I just did a
|
Oh, maybe I should mention that I saved the public key, output of
But the issue is the same when I try with terraform. |
Thanks for additional information @ecky-l, but I think the Once this is resolved upstream, we can update the packages. |
Perhaps another way to workaround this would be to use the now-supported ed25519 key-type option for the keypair? https://aws.amazon.com/about-aws/whats-new/2021/08/amazon-ec2-customers-ed25519-keys-authentication/ |
And unfortunately, ed25519 is not fips-compliant anyway. So even that wouldn't actually help me here. Ok, time to follow the upstream golang issues... |
We're tracking this upstream issue in #30134, closing as duplicate. |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. |
Hello,
with the most recent version of CoreOS, 33.20210117.3.2, I cannot use the terraform ssh connection provisioner anymore. It used to work in prior versions.
Problem is that a SSH connection cannot be established by means of the tf connector, but it works with a simple “ssh core@”. Here are two log entries from the hosts syslog, acquired with journalctl while trying to login with either method:
When trying with terraform connector (failure):
When trying with “ssh core@…” (success):
The user is in both cases the same (core) and authentication is to be performed via RSA pub key from ssh-agent. Here is a simple terraform module to reproduce the case:
when running “terraform init” and “terraform apply”, the apply hangs and dies. It works for any other host, which is not CoreOS.
When setting the TF_LOG to TRACE, there is a related message:
Some more context is below under "debug output".
There is some more info on the host's syslog, when I try to connect via the terraform connector:
But I suspect that this is not fully relevant, since the simple ssh command works with the same key on that host, while the terraform connector doesn't. I suspect it is related to the concrete invocation of ssh from terraform in combination with the particular sshd configuration on this fedora coreos version...
Terraform Version
Debug Output (relevant parts only)
Expected Behavior
It should be possible to connect to coreos hosts with terraform ssh connection and file provisioner (or any other provisioner respectively)
Actual Behavior
ssh connection is not possible with terraform connector, while it is possible by simple ssh command.
Steps to Reproduce
copy the code above into a main.tf, setup a simple coreos VM somewhere, then run
terraform init
terraform apply
References
See also my related forum post at Fedora Discussions.
The text was updated successfully, but these errors were encountered: