Searching the Codeberg website and the internet unfortunately didn't come up with any results.
DNSSEC+SSHFP for SSH key fingerprints of Codeberg? #89
Do you have any plans for enabling DNSSEC and adding SSHFP records so SSH config could just be told VerifyHostKeyDNS yes ?
@Mikaela : good idea, we will definitely discuss this!
@ikselven : thank you for bringing this up, we will post these with the next website update!
@ikselven : Fingerprints are now added to the imprint page (accessible from the footer link):
https://codeberg.org/Codeberg/org/src/branch/master/Imprint.md
I'm getting this message when I try to verify the SSH connection. The fingerprint shown doesn't match the fingerprint on the Imprint page.
$ ssh -T git@codeberg.org
The authenticity of host 'codeberg.org (159.69.0.178)' can't be established.
ECDSA key fingerprint is SHA256:T9FYDEHELhVkulEKKwge5aVhVTbqCW0MIRwAfpARs/E.
Are you sure you want to continue connecting (yes/no/[fingerprint])?
Am I missing something here?
The fingerprint is SHA256-encoded, the table on the imprint page lists the base64 format as used for example by ssh-keyscan.
Your key is correct.
Thank you!
Why was this closed? SSHFP is still missing and a wanted feature
SSHFP only or DNSSEC+SSHFP? (The former probably quick'n'easy, the latter quite some effort)
SSHFP without DNSSEC is quite pointless since it could be spoofed then
As a new user I was curious about this. I looked into it - it seems that codeberg.org's DNS records live on ns{1,2,3}.dnsowl.com. which is provided by Namesilo as a registrar.
Looking at Namesilo's support, they allow customers to add their own DS records, but they don't seem to manage DNSSEC for you. My own registrar, Mythic Beasts, provides managed DNSSEC.
If Codeberg wanted to provide DNSSEC, it may be easier to switch registrar than attempt to manage it directly. But once DNSSEC is provided, SSHFP records become useful.
Reduces accessibility and is thus a "bug" for certain user groups on Codeberg.
Something is not working the way it should. Does not concern outages.
Errors evidently caused by infrastructure malfunctions or outages
This issue involves Codeberg's downstream modifications and settings and/or Codeberg's structures.
Please join the discussion and consider contributing a PR!
No bug, but an improvement to the docs or UI description will help
This issue or pull request already exists
New feature
Involves changes to the server setups, use `bug/infrastructure` for infrastructure-related user errors.
An issue directly involving legal compliance
involving questions about the ToS, especially licencing compliance
Please consider editing your posts and remember that there is a human on the other side. We get that you are frustrated, but it's harder for us to help you this way.
Things related to Codeberg's external communication
More information is needed
This issue contains a clearly stated problem. However, it is not clear whether we have to fix anything on Codeberg's end, but we're helping them fix it and/or find the cause.
Related to Forgejo. Please also check Forgejo's issue tracker.
Migration related issues in Forgejo
Issues related to the Codeberg Pages feature
Issue is related to the Weblate instance at https://translate.codeberg.org
Woodpecker CI related issue
involves improvements to the sites security
Add a new service to the Codeberg ecosystem (instead of implementing into Gitea)
An open issue or pull request to an upstream repository to fix this issue (partially or completely) exists (i.e. Gitea, Forgejo, etc.)
Codeberg's current set of contributors are not planning to spend time on delegating this issue.
No due date set.
No dependencies set.
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?