-
Notifications
You must be signed in to change notification settings - Fork 103
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add support for ED25519 key algorithm #150
Comments
On prioritisation, note that this is starting to become a serious problem with the ongoing deprecations of RSA keys. For example, right now a complete deployment flow of NixOS machines on AWS does not work as RSA keys being disabled by default in SSH servers have led to a situation of subtle incompatibilites:
This means current workarounds are that custom AMIs with RSA enabled need to be created, or keys need to be imported by other means than generation inside of Terraform. These kinds of problems will likely only increase in number from here on. |
@tazjin thank you - yes, no worries, this is happening :) |
Thank you, @detro. We hope it's happening soon as we now generate those outside of Terraform. |
👍 @nikolay - I'm still finding my pace as the newest member of the HashiCorp team that maintain these, but yours and other PRs definitely helped to get this moving faster. |
It would be great if we could please get a release with the We are getting hardened RHEL 8 images from the security team, and we build custom AMI's with packer. Each ENV we create has a custom SSH key on the bastion host that is generated via terraform. As of this moment, terraform can no longer create working keys ( packer/golang ssh implementation breaks), so we have to either disable fips ( cant ) or have packer spin up public instances with temp keys. If we could just create the proper keys in terraform this entire problem goes away. Thank you. |
Hello @jseiser - thanks for your comment. We are working full blast on this issue, and we are aware of the demand for ED25519. Example, the As HashiCorp we see it as our mission to provide a high quality provider, and that means covering all the bases. I hope this clarifies things and our approach to major feature requests like ED25519 support. |
@detro I appreciate the response, and ill honestly leave it alone after this.
I mean, it could.
The current provider is deprecated/broken in certain situations. There is a fix in the code base for parts of it, that would increase the quality of the provider. So instead of getting some fixes, we get nothing fixed, for the promise of future fixes. Again, I appreciate the effort and the response. I disagree with the process, but its your process and Ill leave it at that. Thank you. |
This feature is now fully implemented and we are gearing up for releasing The full feature set can be seen in #176 where we are refining the changelog. |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. |
Background
Support for the ED25519 key algorithm has been a community-requested feature for this provider for a while. The first issue we could track down was filed in May 2018 (#26). Since then, multiple contributors attempted to bridge this gap (#32 in Nov 2018, #59 in Oct 2019, #85 in Oct 2020).
We want to take this opportunity to thank all the contributors (@jbboehr, @kaidence, @invidian, @nikolay) for the PR they submitted, and also to apologize for the long delay in getting this set of functionalities added to this provider. HashiCorp has a policy to prioritize stability and bug-fixes over any new feature for our “utility providers”; but given the demand for this feature, we decided to look into this and see how we could fit ED25519 inside the feature set.
Proposal
To serve the community at our best, we want to provide a well-rounded implementation that adds support for ED25519. Specifically, we want it to match the same functionality coverage as per the currently-supported RSA and ECDSA.
The implementation will include changes to the following entities, so that they accept
ED25519
as input in theiralgorithm / key_algorithm
configuration fields:Resources:
tls_private_key
(tls_private_key
resource: adding support for ED25519 key algorithm #151)private_key_openssh
tls_cert_request
(Adding support for ED25519 to all the*_cert
resources #173)tls_locally_signed_cert
(Adding support for ED25519 to all the*_cert
resources #173)tls_self_signed_cert
(Adding support for ED25519 to all the*_cert
resources #173)Data sources:
tls_public_key
(ED25519: updatingtls_public_key
data source #160)As work proceeds, PRs will be linked back to this issue for full context.
References
Addresses: #26
Supersedes: #32
Supersedes: #59
Supersedes: #85
The text was updated successfully, but these errors were encountered: