SSH keys length can prevent user from login in Fedora infrastructure #7377
Labels
No labels
announcement
authentication
automate
aws
backlog
blocked
bodhi
ci
Closed As
Duplicate
Closed As
Fixed
Closed As
Fixed with Explanation
Closed As
Initiative Worthy
Closed As
Insufficient data
Closed As
Invalid
Closed As
Spam
Closed As
Upstream
Closed As
Will Not or Can Not fix
cloud
communishift
copr
database
deprecated
dev
discourse
dns
downloads
easyfix
epel
factory2
firmitas
gitlab
greenwave
hardware
help wanted
high-gain
high-trouble
iad2
koji
koschei
lists
low-gain
low-trouble
mbs
medium-gain
medium-trouble
mini-initiative
mirrorlists
monitoring
Needs investigation
notifier
odcs
OpenShift
ops
OSBS
outage
packager_workflow_blocker
pagure
permissions
Priority
Needs Review
Priority
Next Meeting
Priority
🔥 URGENT 🔥
Priority
Waiting on Assignee
Priority
Waiting on External
Priority
Waiting on Reporter
rabbitmq
rdu-cc
release-monitoring
releng
repoSpanner
request-for-resources
s390x
security
SMTP
src.fp.o
staging
taiga
unfreeze
waiverdb
websites-general
wiki
No milestone
No project
No assignees
8 participants
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference: Infrastructure/fedora-infrastructure#7377
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Since yesterday I was unable to login into src.fedoraproject.org and pagure.io: everytime I clicked on Login button I was prompted to the same webpage, like if I pressed refresh button.
Today Patrick Uiterwijk told me that my SSH keys are too long (3 keys each related to 8196 bit private key), which means the cookie it gets all stored in is too big, and browsers ignore it.
In my humble opinion it is a design flaw, because the user is not told to not insert "too" long SSH keys
When do you need this? (YYYY/MM/DD)
Well I would have needed it now.
When is this no longer needed or useful? (YYYY/MM/DD)
I don't know
If we cannot complete your request, what is the impact?
I cannot use all my SSH keys
Metadata Update from @pingou:
Metadata Update from @bowlofeggs:
@germano ,
Not to discount your concern, but 8196 bit rsa keys are not 'typical' in this day and age, mostly it's 4096 or some variant of the ed25519/ecdsa/{insert ecc curve here}. You indicate having 3 keys, these are all for Fedora ??? Arguably the quickest and easiest fix to this would be to make some rsa4096 key(s) or ecc keys for Fedora uses, and return to https://admin.fedoraproject.org/accounts and browse to these new key(s) and upload and within ~ 30 or the next timed sync whichever comes first you should be able to login as desired.
Note: If you need to access any host that is still running on RHEL/CentOS 6 it will NOT work with a ecc key ( presently and likely not thru the lifecycle of those hosts from my understanding) so I'd advise rsa4096. While 8196 is nice to have most services don't natively support it, or have cookie space for them.
Hope this helps at least in expanding on puiterwijk's (Patrick) comments last week.
@pingou so we could go to OIDC on the web interface of pagure anytime? Or are we waiting for the api to be done first?
Alternately, we could try a small fas patch to reject too long ssh keys, but not sure how hard that would be or if we want to update fas.
Metadata Update from @cverna:
Metadata Update from @smooge:
Technically yes
I think the hope/idea was to have both at once, but maybe we should re-consider
Metadata Update from @pingou:
So, I see our options here:
Thoughts?
i'm
There has been no response from the initial reporter since this was reported, so going to implement 3)
closing as won't fix, and it can be reopen when 1) or 2) happens. (or if the original reporter wants it open still for some reason)
Metadata Update from @ryanlerch: