New Case Study:See how Anthropic automated 95% of dependency reviews with Socket.Learn More
Socket
Sign inDemoInstall
Socket

ssh_sig

Package Overview
Dependencies
Maintainers
1
Alerts
File Explorer

Advanced tools

Socket logo

Install Socket

Detect and block malicious and high-risk dependencies

Install

ssh_sig

  • 0.1.1
  • Rubygems
  • Socket score

Version published
Maintainers
1
Created
Source

SshSig - SSH signature verification in pure ruby

SshSig is a Ruby gem which can be used to verify signatures signed created by ssh-keygen. This capability was first added in OpenSSH 8.0 allows SSH keys to be used for GPG-like signing capabilities, including signing git commits.

Installation

Add this line to your application's Gemfile:

gem 'ssh_sig'

And then execute:

$ bundle install

Or install it yourself as:

$ gem install ssh_sig

Usage

Version 1 of the SSH signature format supports ed25519 and rsa keys. It is recommended that you use ed25519 over rsa where possible (ssh-keygen -t ed25519).

In order to verify a signature you need:

  1. The public key of the sender
  2. The signature file
  3. The message to be verified.
require 'ssh_sig'

armored_pubkey = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAILXPkJPI4TMFWZP4xRBQjNeizUG99KuZCt9G23rX48kz"

blob = ::SshSig::Blob.from_armor(
  <<~EOF
  -----BEGIN SSH SIGNATURE-----
  U1NIU0lHAAAAAQAAADMAAAALc3NoLWVkMjU1MTkAAAAgtc+Qk8jhMwVZk/jFEFCM16LNQb
  30q5kK30bbetfjyTMAAAAEZmlsZQAAAAAAAAAGc2hhNTEyAAAAUwAAAAtzc2gtZWQyNTUx
  OQAAAECJITeYJIlEeydsCTh1DkfdhlDJFBa73ojfWe0MbrIzoJKd9THd9WeQrhygSRGsNG
  cU/stk3/919nykg67yG2gN
  -----END SSH SIGNATURE-----
  EOF
)

message = "This message was definitely sent by Brian Williams"

valid = ::SshSig::Verifier
  .from_armored_pubkey(armored_pubkey)
  .verify(blob, message)

if valid
  puts 'Signature is valid'
else
  puts 'Signature is not valid'
end

Signatures can be created using ssh-keygen -Y sign -n file -f ~/.ssh/ed_25519 message.txt and will be outputted in message.txt.sig.

Public keys can be found in a variety of places, including:

  • Your ~/.ssh/id_<alg>.pub file
  • authorized_keys files on servers
  • https://gitlab.com/<username>.keys
  • https://github.com/<username>.keys

The SshSig::Verifier#from_gitlab and SshSig::Verifier#from_github methods are provided to automatically load public keys from the respective <username>.keys urls.

require 'ssh_sig'

blob = ::SshSig::Blob.from_armor(
  <<~EOF
  -----BEGIN SSH SIGNATURE-----
  U1NIU0lHAAAAAQAAADMAAAALc3NoLWVkMjU1MTkAAAAgtc+Qk8jhMwVZk/jFEFCM16LNQb
  30q5kK30bbetfjyTMAAAAEZmlsZQAAAAAAAAAGc2hhNTEyAAAAUwAAAAtzc2gtZWQyNTUx
  OQAAAECJITeYJIlEeydsCTh1DkfdhlDJFBa73ojfWe0MbrIzoJKd9THd9WeQrhygSRGsNG
  cU/stk3/919nykg67yG2gN
  -----END SSH SIGNATURE-----
  EOF
)

message = 'This message was definitely sent by Brian Williams'

valid = ::SshSig::Verifier
  .from_gitlab('bwill')
  .verify(blob, message)

if valid
  puts 'Signature is valid'
else
  puts 'Signature is not valid'
end

Is it safe to re-purpose SSH keys for signing?

Yes. The SSH signature protocol is designed to be resistant to cross-protocol attacks, where signatures created for one purpose (i.e. signing a git commit), may be re-used for another purpose (i.e. authenticating to a server). It does this using the magic pre-amble (to differentiate between messages signed by ssh-keygen and messages used for SSH authentication) and namespaces (to differentiate between messages signed by ssh-keygen but used for different purposes). This causes identical messages to produce different signatures for each different protocol.

Development

After checking out the repo, run bin/setup to install dependencies. Then, run rake spec to run the tests. You can also run bin/console for an interactive prompt that will allow you to experiment.

To install this gem onto your local machine, run bundle exec rake install. To release a new version, update the version number in version.rb, and then run bundle exec rake release, which will create a git tag for the version, push git commits and the created tag, and push the .gem file to rubygems.org.

Contributing

Bug reports and pull requests are welcome on GitHub at https://github.com/[USERNAME]/ssh_sig. This project is intended to be a safe, welcoming space for collaboration, and contributors are expected to adhere to the code of conduct.

License

The gem is available as open source under the terms of the MIT License.

FAQs

Package last updated on 07 Dec 2021

Did you know?

Socket

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Install

Related posts

SocketSocket SOC 2 Logo

Product

  • Package Alerts
  • Integrations
  • Docs
  • Pricing
  • FAQ
  • Roadmap
  • Changelog

Packages

npm

Stay in touch

Get open source security insights delivered straight into your inbox.


  • Terms
  • Privacy
  • Security

Made with ⚡️ by Socket Inc