Uploaded image for project: 'Jenkins'
  1. Jenkins
  2. JENKINS-39738

Not able to add SSH Key in Jenkins Configuration [The cipher 'aes256-cbc' is required, but it is not available.]

    XMLWordPrintable

    Details

    • Similar Issues:

      Description

      I Have installed 'Publish Over SSH' plugin in Jenkins and would like to transfer few files to SSH Server after each Build .

      I have generated the private key using 'puttygen' with passphrase and have given the OpenSSH Public Key in 'authorization_keys' in SSH Server.

      Using the generated private key and passphrase , I'm able to login to the SSH Server through Putty .

      But in Jenkins I'm not able to add the SSH Key . Getting the below Error .

      jenkins.plugins.publish_over.BapPublisherException: Failed to add SSH key. Message [The cipher 'aes256-cbc' is required, but it is not available

        Attachments

          Issue Links

            Activity

            Hide
            oleg_nenashev Oleg Nenashev added a comment -

            Took it for triage

            Show
            oleg_nenashev Oleg Nenashev added a comment - Took it for triage
            Hide
            oleg_nenashev Oleg Nenashev added a comment -

            Still not a defect since it was "as designed", converting to improvement

            Show
            oleg_nenashev Oleg Nenashev added a comment - Still not a defect since it was "as designed", converting to improvement
            Hide
            oleg_nenashev Oleg Nenashev added a comment -

            After some consideration I decided to add native support of 192 and 256 CTR ciphers: https://github.com/jenkinsci/sshd-module/pull/14 . CBC ciphers won't be added due to https://www.kb.cert.org/vuls/id/958563 . It will be possible to define them on your own risk once JENKINS-23812 is implemented

            Show
            oleg_nenashev Oleg Nenashev added a comment - After some consideration I decided to add native support of 192 and 256 CTR ciphers: https://github.com/jenkinsci/sshd-module/pull/14 . CBC ciphers won't be added due to https://www.kb.cert.org/vuls/id/958563 . It will be possible to define them on your own risk once JENKINS-23812 is implemented
            Hide
            scm_issue_link SCM/JIRA link daemon added a comment -

            Code changed in jenkins
            User: Oleg Nenashev
            Path:
            src/main/java/org/jenkinsci/main/modules/sshd/SSHD.java
            src/test/java/org/jenkinsci/main/modules/ssh/SSHDTest.java
            src/test/java/org/jenkinsci/main/modules/sshd/SSHDTest.java
            http://jenkins-ci.org/commit/sshd-module/bb6963453086edef4e600abb2740182cd2f4ade0
            Log:
            [FIXED JENKINS-39738] - Enable aes192ctr and aes256ctr ciphers if JVM supports them (#14)

            • [FIXED JENKINS-39738] - Enable aes192ctr and aes256ctr ciphers if JVM supports them

            If the JVM supports unlimited-strength encryption, we can enable more ciphers.
            And the new SSHD core version provides good API for it.

            CBC ciphers won't be added due to https://www.kb.cert.org/vuls/id/958563

            • JENKINS-39738 - Address comment from @jglick regarding the logging formatters
            Show
            scm_issue_link SCM/JIRA link daemon added a comment - Code changed in jenkins User: Oleg Nenashev Path: src/main/java/org/jenkinsci/main/modules/sshd/SSHD.java src/test/java/org/jenkinsci/main/modules/ssh/SSHDTest.java src/test/java/org/jenkinsci/main/modules/sshd/SSHDTest.java http://jenkins-ci.org/commit/sshd-module/bb6963453086edef4e600abb2740182cd2f4ade0 Log: [FIXED JENKINS-39738] - Enable aes192ctr and aes256ctr ciphers if JVM supports them (#14) [FIXED JENKINS-39738] - Enable aes192ctr and aes256ctr ciphers if JVM supports them If the JVM supports unlimited-strength encryption, we can enable more ciphers. And the new SSHD core version provides good API for it. CBC ciphers won't be added due to https://www.kb.cert.org/vuls/id/958563 JENKINS-39738 - Use FINE logging level for Disabled ciphers JENKINS-39738 - Address comment from @jglick regarding the logging formatters
            Hide
            scm_issue_link SCM/JIRA link daemon added a comment -

            Code changed in jenkins
            User: Jesse Glick
            Path:
            cli/pom.xml
            cli/src/main/java/hudson/cli/SSHCLI.java
            test/src/test/java/hudson/cli/CLITest.java
            war/pom.xml
            http://jenkins-ci.org/commit/jenkins/00956ff9dad31897c84e5d50466b3904684006df
            Log:
            [JENKINS-39738, JENKINS-43668] - Pick up SSHD module including sshd-core 1.6.0 (#2853)

            • Pick up SSHD module including sshd-core 1.4.0.
            • Picking up Apache SSHD 1.6.0 & Jenkins sshd module 2.0.
            Show
            scm_issue_link SCM/JIRA link daemon added a comment - Code changed in jenkins User: Jesse Glick Path: cli/pom.xml cli/src/main/java/hudson/cli/SSHCLI.java test/src/test/java/hudson/cli/CLITest.java war/pom.xml http://jenkins-ci.org/commit/jenkins/00956ff9dad31897c84e5d50466b3904684006df Log: [JENKINS-39738, JENKINS-43668] - Pick up SSHD module including sshd-core 1.6.0 (#2853) Pick up SSHD module including sshd-core 1.4.0. [FIXED JENKINS-39738] Picking up https://github.com/jenkinsci/sshd-module/commit/bb6963453086edef4e600abb2740182cd2f4ade0 Picking up Apache SSHD 1.6.0 & Jenkins sshd module 2.0.
            Hide
            oleg_nenashev Oleg Nenashev added a comment -

            SSHD Module 2.0 has been integrated towards the Jenkins 2.69 release

            Show
            oleg_nenashev Oleg Nenashev added a comment - SSHD Module 2.0 has been integrated towards the Jenkins 2.69 release

              People

              • Assignee:
                oleg_nenashev Oleg Nenashev
                Reporter:
                jeevan_anekal Jeevan S
              • Votes:
                1 Vote for this issue
                Watchers:
                3 Start watching this issue

                Dates

                • Created:
                  Updated:
                  Resolved: