Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Move away from EDDSA !! #1000

Open
karthickm512 opened this issue Mar 19, 2025 · 8 comments
Open

Move away from EDDSA !! #1000

karthickm512 opened this issue Mar 19, 2025 · 8 comments

Comments

@karthickm512
Copy link

SSHJ uses i2p.crypto.eddsa 0.3.0 which is 7 years old and no new version exists as well as impacted by CVE-2020-36843. If there are any vulnerabilities and they do not release, sshj will be affected and of course we as users of sshj will be affected. Any possibility of switching to alternative 3PP?

@hierynomus
Copy link
Owner

@karthickm512 I was in the process of merging changes wrt this. I think the current master now no longer uses eddsa

@exceptionfactory
Copy link
Contributor

Thanks for merging pull request #993 @hierynomus!

With that pull request merged, the eddsa library is no longer a project dependency.

@juan-philippe
Copy link

@hierynomus thank you for your help here. Is there any plan to cut a new version soon now that this dependency has been removed?

@juan-philippe
Copy link

(And thank you @exceptionfactory!)

@karthickm512
Copy link
Author

Will the eddsa removal affect the products that use sshj and operating on java11?

@exceptionfactory
Copy link
Contributor

Will the eddsa removal affect the products that use sshj and operating on java11?

SSHJ continues to work with Java 11 and earlier using the Bouncy Castle library to provide Ed25519 algorithm support. The GitHub workflows run on Java 11 as well, providing confirmation of continued functionality following the removal of the eddsa library.

@karthickm512
Copy link
Author

Wonderful. Then it is more of waiting for sshj release !!

@mmellon
Copy link

mmellon commented Mar 21, 2025

Our company needs this mitigation as soon as possible. What can we do to help you publish a new release to Maven Central with this fix?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

5 participants