Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

ed25519 key support #13633

Open
svenstaro opened this issue Jul 7, 2022 · 3 comments
Open

ed25519 key support #13633

svenstaro opened this issue Jul 7, 2022 · 3 comments
Labels
stage/accepted Confirmed, and intend to work on. No timeline committment though. theme/config theme/tls type/enhancement

Comments

@svenstaro
Copy link

Proposal

Nomad currently can't use ed25519 keys: client setup failed: Unsupported signature algorithm ed25519.PrivateKey; RSA and ECDSA only are supported.

I think it'd be great if Nomad could read these keys.

Use-cases

It's not such a well supported algorithm but security of it seems pretty good so why not?

Attempted Solutions

Well, at least ECDSA works.

@tgross tgross added the stage/accepted Confirmed, and intend to work on. No timeline committment though. label Jul 7, 2022
@tgross
Copy link
Member

tgross commented Jul 7, 2022

Hi @svenstaro! It looks like we don't have support for that in Consul TLS either, so it's probably worth us looking at the set of cipher suites we support for TLS in general. I'm going to ping @picatz for his expertise and mark this for roadmapping.

@svenstaro
Copy link
Author

Of course, support for this algorithm would be appreciated in Consul as well.

@quentin9696
Copy link

Hi !

Any updates on this feature request?
We would love to get rid of large RSA certs in favor of ED25519

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
stage/accepted Confirmed, and intend to work on. No timeline committment though. theme/config theme/tls type/enhancement
Projects
Status: Needs Roadmapping
Development

No branches or pull requests

3 participants