Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

workaround for paramiko issue with ecdsa-sha2-nistp256 key #3489

Closed
mpdehaan opened this issue Jul 10, 2013 · 2 comments
Closed

workaround for paramiko issue with ecdsa-sha2-nistp256 key #3489

mpdehaan opened this issue Jul 10, 2013 · 2 comments
Labels
bsd BSD community bug This issue/PR relates to a bug.

Comments

@mpdehaan
Copy link
Contributor

User on OpenBSD reported that paramiko does not persist, and in fact can remove, a key of the above type from known hosts. root problem appears to be in paramiko not understanding this key type. (Not yet reproduced, also note default on OpenBSD is now openssh, not paramiko, but paramiko can be selected)

See comment on paramiko/paramiko#67

impact: Starting in Ansible 1.2.2, Ansible defaults to the "smart" connection type and will only use paramiko if it does not support ControlPersist or is explicitly selected, so this should not affect many users. However, it's definitely not a good thing that paramiko would discard them from the file for "non-common key types". More reason for moving away from paramiko as a default.

However, Ansible should add a safeguard to detect the number of changes to known hosts to guard against this -- namely, if the file does not grow by exactly 1 line and change no other lines, it's not reasonable to rewrite the file, as paramiko may have the above bug. In this event it should raise a warning.

@mpdehaan
Copy link
Contributor Author

mpdehaan commented Oct 7, 2013

I haven't heard any reports of this recently so I am going to close this issue.

Most people should be using -c ssh now and paramiko is around for EL6, which does not default to this keytype.

@mpdehaan mpdehaan closed this as completed Oct 7, 2013
@hansbogert
Copy link

Actually this hit me only recently. It was quite an ordeal to pinpoint it to this issue. How can I debug why my ansible (installed through macports) is not using SSH by default?

@ansibot ansibot added bug This issue/PR relates to a bug. and removed bug_report labels Mar 6, 2018
@dagwieers dagwieers added the bsd BSD community label Jan 18, 2019
@ansible ansible locked and limited conversation to collaborators Apr 24, 2019
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
bsd BSD community bug This issue/PR relates to a bug.
Projects
None yet
Development

No branches or pull requests

4 participants