You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository has been archived by the owner on Nov 7, 2023. It is now read-only.
Looking into this, unfortunately with how things are architected, this requires an update to the mobile apps as well.
Currently the daemon is failing to parse the signature payload as the agent restriction change modified the payload to include an additional server host key field. ssh.Unmarshal errors out if after unmarshaling there is still data in the buffer. This can be fixed with
typesignaturePayloadstruct {
Session []byteTypebyteUserstringServicestringMethodstringSignboolAlgo []bytePubKey []byte// OpenSSH 8.9 modifies the struct, use the "rest" tag to either take an empty slice on older versions, or the host key on newer versionsServerHostKey []byte`ssh:"rest"`
}
However, the daemon<>app protocol attempts to optimise the payload that is sent over the wire, so the public key is omitted from the signature payload, and the mobile app is responsible for appending the key to the payload to be signed.
This is problematic with agent restriction, as the new server host key comes after the public key, which means without changes to the mobile apps, it is not possible to get the apps to sign the correct payload.
The new Akamai akr tool doesn't suffer from this as it treats the signature payload as an opaque blob to sign.
Sign up for freeto subscribe to this conversation on GitHub.
Already have an account?
Sign in.
https://www.openssh.com/agent-restrict.html#authverify
openssh-server 1:8.9p1-3 arm64
vs.
The text was updated successfully, but these errors were encountered: