-
Notifications
You must be signed in to change notification settings - Fork 9.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
SSH provisioner incompatible with Fedora 33, 34, 35 and CentOS Stream 9; also RHEL 8 with FIPS #30134
Comments
Ah, sorry for the duplicate. I did search beforehand, but not well enough it seems :( I was surprised that it hadn't been reported given F33's age. Feel free to close this one if you want. |
This is also the case with Amazon Linux 2022 as that is derived from Fedora.
|
Is there any update on this issue |
Per #30134 (comment), it looks like the upstream issue is not yet resolved. |
I believe golang/go#39885 was mentioned somewhere along the lines as a blocker for this issue, which now has been closed - however the above comments mention a "closing as duplicate" loop linking to each other, which issue is the one to follow now that the golang upstream closed it out? Thanks! |
We are still tracking this dependency: golang/go#49952 I believe that is the last puzzle piece before this issue can be resolved. |
@crw the only outstanding issue on golang/go#49952 appears to relate to the Go SSH server implementation. The Go SSH client implementation is fixed? That's how it reads to me at least. |
Just re-read the internal conversation. We are waiting for the entire project as tracked in that ticket to be completed before updating. You may be correct that the relevant client bits are completed. In this case, we are erring on the side of caution. |
Considering how slowly the golang project is moving to fix this issue fully, and the ssh provisioner is only using the client-side code, can we please reconsider the decision to wait? At least pull it in and test it. If it works, great! If it doesn't, now you have a branch with the test code. |
Just for completeness, this issue is also present when using Terraform to deploy the recently released |
These changes should be visible in the next 1.2 build. Thanks for the on-going feedback, we do appreciate it! |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. |
Fedora 33 updated the system-wide crypto policy to disallow SHA-1 hashes in signatures. This is a good thing, especially since OpenSSH follows suit as of version 8.8
The upstream golang issue is golang/go#39885
Terraform Version
Terraform Configuration Files
Debug Output
Expected Behavior
The file should be copied via ssh.
Actual Behavior
The file was not copied due to an ssh connection error
Steps to Reproduce
update-crypto-policies --set FIPS
Additional Context
The workaround is to enable the insecure ssh-rsa key type:
then
systemctl reload sshd
References
There are a host of related issues about this across the go ecosystem:
Related issues:
Unless hashicorp wants to maintain a forked version of the golang lib, then there's not much to do but wait. I've opened this ticket to track the issue.
The text was updated successfully, but these errors were encountered: