You are viewing a plain text version of this content. The canonical link for it is here.
Posted to issues@karaf.apache.org by "Jean-Baptiste Onofré (JIRA)" <ji...@apache.org> on 2018/02/11 19:31:00 UTC

[jira] [Resolved] (KARAF-5590) SSHD client authentication fails with JDK 1.8.0_161

     [ https://issues.apache.org/jira/browse/KARAF-5590?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]

Jean-Baptiste Onofré resolved KARAF-5590.
-----------------------------------------
       Resolution: Cannot Reproduce
    Fix Version/s:     (was: 4.1.5)
                       (was: 4.2.0)
                       (was: 4.0.11)

I'm not able to reproduce with JDK 1.8.0_161 or 1.8.0_162. I tried a SNAPSHOT version compiled locally or with 4.1.4 from website (so compiled with another JDK).

> SSHD client authentication fails with JDK 1.8.0_161
> ---------------------------------------------------
>
>                 Key: KARAF-5590
>                 URL: https://issues.apache.org/jira/browse/KARAF-5590
>             Project: Karaf
>          Issue Type: Bug
>          Components: karaf-shell
>            Reporter: Jean-Baptiste Onofré
>            Assignee: Jean-Baptiste Onofré
>            Priority: Blocker
>
> After upgrading to JDK 1.8.0_161, the {{bin/client}} fails to connect with:
> {code}
> "java.security.InvalidKeyException: The security strength of SHA-1 digest algorithm is not sufficient for this key size"
> {code}
> It's related to oracle changed the defaults for DSA keys in jarsigner and keytool in jdk 1.8.151, see http://www.oracle.com/technetwork/java/javase/8u151-relnotes-3850493.html
> I think we can workaround by providing a key to {{bin/client}} and overriding the one in {{etc/org.apache.karaf.shell.cfg}} configuration file.
> At least, it has to be tested.



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)