This Java library implements the OpenSSH lightweight signature (and verification) ability introduced with OpenSSH 8.1. It allows to sign (and verify) messages using SSH keys according to the SSHSIG protocol.
With OpenSSH signing a string can be done with
echo -n "a message" | ssh-keygen -Y sign -f ~/.ssh/id_rsa -n namespace
For further details please take a look at the manual or read this blog post.
Using this Java library signing a string looks like
KeyPairGenerator tKeyPairGenerator = KeyPairGenerator.getInstance("RSA");
KeyPair tKeyPair = tKeyPairGenerator.generateKeyPair();
SshSignatureGenerator.create().generateSignature(tKeyPair, "namespace", "a message");
Both cases will produce a SSH signature like this
-----BEGIN SSH SIGNATURE-----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-----END SSH SIGNATURE-----
- Required minimal Java runtime: 8
- Minimal 3rd party dependencies (only slf4j)
- Content to be signed can be provided as string, byte array, file or as input stream
- Supported ssh key types: DSA, RSA, Ed25519
- Supported hashing algorithms: SHA-256 and SHA-512
- Pluggable signing backend: The default backend uses the Java Cryptography Architecture (JCA) but we also provide an alternative backend which facilitates using an SSH-Agent via Apache MINA.
- Works with other JCA/JCE provider, tested with Bouncy Castle and net.i2p.crypto:eddsa
- OSGi bundle
- (Command line client) still pending
Released artifacts are available at Maven Central.
We provide the following artifacts:
- sshsig-core - contains the core implementation including the default JCA signing backend
- sshsig-mina - contains the Apache MINA signing backend
- (sshsig-cli - contains the command line interface) still pending
You need at least sshsig-core which contains a fully functional implementation.
For consuming via maven add the following snippet to your pom.xml
<dependency>
<groupId>de.profhenry.sshsig</groupId>
<artifactId>sshsig-core</artifactId>
<version>1.0.0</version>
</dependency>
For consuming via gradle add the following snippet to your build.gradle
implementation group: 'de.profhenry.sshsig', name: 'sshsig-core', version: '1.0.0'
All other artifacts are optional and only required in case you need their provided features.
-
Ed25519 key support
Java 8 comes with no support for Ed25519. So in case you want to sign with an Ed25519 key when using the default JCA signing engine you will need a 3rd party lib which adds Ed25519 support to JCA (for example Bouncy Castle or net.i2p.crypto:eddsa). In case you are using a Java 15+ runtime no additional JCA providers are required. -
RSA key support
The SSHSIG protocol states that the allowed signing algorithms are rsa-sha2-512 or rsa-sha2-256. However the OpenSSH implementation just uses rsa-sha2-512, so the Java library does the same thing. -
DSA key suppport
Signing with DSA keys was not explicitly mentioned in SSHSIG protocol but seems to be supported, so support was added in the Java library as well. Please note that DSA signatures are not deterministic! So when signing the same content with the same key you will get a different signature! -
Hashing algorithm
The SSHSIG protocol allows SHA-256 and SHA-512 for hashing messages before they get signed, where SHA-512 is the default. The Java library behaves the same way. Please note that every JVM comes at least with support for SHA-256. However most JVMs also support SHA-512 (Temurin for example). So depending on the used JVM you might need a 3rd party lib which adds SHA-512 support to JCA (for example Bouncy Castle). -
Reading SSH keys files with Java
Reading existing SSH key files generated with ssh-keygen or openssl just with plain Java and without any 3rd party libs is a pain in the ass :-/. We did this in the unit tests for the core library in order to prove that this does not rely on any 3rd parts libs. For any serious or productive usage it is highly recommended to make use of 3rd party libs for reading SSH keys. Especially in case your keys have a passphrase it is probably best to make use of an SSH-Agent via Apache MINA which then also takes care of reading the SSH keys.
This project is licensed under the Apache 2.0 License