You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The OpenSSH client guidelines include ssh-rsa, but not rsa-sha2-256 or rsa-sha2-512 in HostKeyAlgorithms. I couldn't find the rationale and wondered if that's worth reconsidering.
I'm raising the issue because the OpenSSH 8.2 release notes mention disabling ssh-rsa in "a near-future release" and list rsa-sha2-256/512 as alternatives. Testing on my own systems revealed that github.com currently offers ssh-dss,rsa-sha2-512,rsa-sha2-256,ssh-rsa which is not acceptable with ssh-rsa removed from the current recommendation.
Thanks for considering,
Kevin
The text was updated successfully, but these errors were encountered:
Jakuje
added a commit
to Jakuje/infosec.mozilla.org
that referenced
this issue
May 25, 2022
If this isn't going to be maintained (even has a PR pending), it should be unpublished and archived, lest Mozilla recommend bad security practices for the world to stumble upon. The default configuration is more secure than your "modern" configuration and both of your configurations can not connect to some modern servers (offering only an RSA hostkey and thus only rsa-sha2-512,rsa-sha2-256).
The OpenSSH client guidelines include
ssh-rsa
, but notrsa-sha2-256
orrsa-sha2-512
inHostKeyAlgorithms
. I couldn't find the rationale and wondered if that's worth reconsidering.I'm raising the issue because the OpenSSH 8.2 release notes mention disabling
ssh-rsa
in "a near-future release" and listrsa-sha2-256
/512
as alternatives. Testing on my own systems revealed that github.com currently offersssh-dss,rsa-sha2-512,rsa-sha2-256,ssh-rsa
which is not acceptable withssh-rsa
removed from the current recommendation.Thanks for considering,
Kevin
The text was updated successfully, but these errors were encountered: