Skip to content

build(deps): bump golang.org/x/crypto from 0.38.0 to 0.39.0#515

Merged
openshift-merge-bot[bot] merged 2 commits intomainfrom
dependabot/go_modules/golang.org/x/crypto-0.39.0
Jun 24, 2025
Merged

build(deps): bump golang.org/x/crypto from 0.38.0 to 0.39.0#515
openshift-merge-bot[bot] merged 2 commits intomainfrom
dependabot/go_modules/golang.org/x/crypto-0.39.0

Conversation

@dependabot
Copy link
Copy Markdown
Contributor

@dependabot dependabot bot commented on behalf of github Jun 6, 2025

Bumps golang.org/x/crypto from 0.38.0 to 0.39.0.

Commits
  • 3bf9d2a ssh/test: skip KEX test if unsupported by system SSH client
  • 9bab967 go.mod: update golang.org/x dependencies
  • 4f9f0ca x509roots/fallback: add init time benchmark
  • eac7cf0 x509roots/fallback: move parsing code to a non-generated file
  • 18228cd acme: return err from deprecated TLS-SNI-[01|02] functions
  • 73f6362 acme: remove dead code
  • ebc8e46 ssh: add server side support for Diffie Hellman Group Exchange
  • e944286 ssh: expose negotiated algorithms
  • 78a1fd7 ssh: automatically add curve25519-sha256@libssh.org KEX alias
  • ac58737 ssh: export supported algorithms
  • Additional commits viewable in compare view

Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)

@dependabot dependabot bot added dependencies Pull requests that update a dependency file go Pull requests that update Go code labels Jun 6, 2025
@dependabot dependabot bot force-pushed the dependabot/go_modules/golang.org/x/crypto-0.39.0 branch from 8b6c9d4 to 616514f Compare June 10, 2025 12:43
Bumps [golang.org/x/crypto](https://github.com/golang/crypto) from 0.38.0 to 0.39.0.
- [Commits](golang/crypto@v0.38.0...v0.39.0)

---
updated-dependencies:
- dependency-name: golang.org/x/crypto
  dependency-version: 0.39.0
  dependency-type: direct:production
  update-type: version-update:semver-minor
...

Signed-off-by: dependabot[bot] <support@github.com>
@dependabot dependabot bot force-pushed the dependabot/go_modules/golang.org/x/crypto-0.39.0 branch from 616514f to 5cbf06f Compare June 10, 2025 12:54
Signed-off-by: Gunjan Vyas <vyasgun20@gmail.com>
@vyasgun vyasgun force-pushed the dependabot/go_modules/golang.org/x/crypto-0.39.0 branch from b5dc679 to 3c2d3d1 Compare June 23, 2025 05:48
@vyasgun
Copy link
Copy Markdown
Member

vyasgun commented Jun 23, 2025

I tested this by running vfkit with gvproxy and checking network connectivity from inside the VM. Working as expected. Pushed a change to remove the deprecated KeyAlgoDSA from the list of HostKeyAlgorithms which fixes linter error.

@cfergeau
Copy link
Copy Markdown
Collaborator

cfergeau commented Jun 24, 2025

I tested this by running vfkit with gvproxy and checking network connectivity from inside the VM. Working as expected. Pushed a change to remove the deprecated KeyAlgoDSA from the list of HostKeyAlgorithms which fixes linter error.

DSA is being phased out from SSH, so this should be fine, hopefully no one is trying to use DSA with ssh and gvproxy.

OpenSSH plans to remove support for the DSA signature algorithm in
early 2025. This release disables DSA by default at compile time.

DSA, as specified in the SSHv2 protocol, is inherently weak - being
limited to a 160 bit private key and use of the SHA1 digest. Its
estimated security level is only 80 bits symmetric equivalent.

OpenSSH has disabled DSA keys by default since 2015 but has retained
run-time optional support for them. DSA was the only mandatory-to-
implement algorithm in the SSHv2 RFCs, mostly because alternative
algorithms were encumbered by patents when the SSHv2 protocol was
specified.

This has not been the case for decades at this point and better
algorithms are well supported by all actively-maintained SSH
implementations. We do not consider the costs of maintaining DSA
in OpenSSH to be justified and hope that removing it from OpenSSH
can accelerate its wider deprecation in supporting cryptography
libraries.

Currently DSA is disabled at compile time. The final step of
removing DSA support entirely is planned for the first OpenSSH
release of 2025.

@cfergeau
Copy link
Copy Markdown
Collaborator

/lgtm
/approve

@openshift-ci
Copy link
Copy Markdown
Contributor

openshift-ci bot commented Jun 24, 2025

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: cfergeau, dependabot[bot]

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Details Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@openshift-merge-bot openshift-merge-bot bot merged commit 634e3fb into main Jun 24, 2025
20 checks passed
@dependabot dependabot bot deleted the dependabot/go_modules/golang.org/x/crypto-0.39.0 branch June 24, 2025 13:59
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

approved dependencies Pull requests that update a dependency file go Pull requests that update Go code lgtm

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants