From nobody Tue Oct 12 18:25:56 2021 X-Original-To: freebsd-security@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 712B5180180E for ; Tue, 12 Oct 2021 18:26:00 +0000 (UTC) (envelope-from cmt@burggraben.net) Received: from smtp.burggraben.net (smtp.burggraben.net [88.198.69.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "smtp.burggraben.net", Issuer "R3" (not verified)) by mx1.freebsd.org (Postfix) with ESMTPS id 4HTPHW2vgKz3pj2; Tue, 12 Oct 2021 18:25:59 +0000 (UTC) (envelope-from cmt@burggraben.net) Received: from elch.exwg.net (elch.exwg.net [IPv6:2001:470:7120:1:127b:44ff:fe4f:148d]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "elch.exwg.net", Issuer "R3" (verified OK)) by smtp.burggraben.net (Postfix) with ESMTPS id 5BC1AC0030C; Tue, 12 Oct 2021 20:25:57 +0200 (CEST) Received: by elch.exwg.net (Postfix, from userid 1000) id F24ED3AB07; Tue, 12 Oct 2021 20:25:56 +0200 (CEST) Date: Tue, 12 Oct 2021 20:25:56 +0200 From: Christoph Moench-Tegeder To: Eugene Grosbein Cc: Ed Maste , freebsd-security@freebsd.org Subject: Re: Important note for future FreeBSD base system OpenSSH update Message-ID: References: List-Id: Security issues List-Archive: https://lists.freebsd.org/archives/freebsd-security List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-security@freebsd.org X-BeenThere: freebsd-security@freebsd.org MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline In-Reply-To: User-Agent: Mutt/2.1.3 (2021-09-10) X-Rspamd-Queue-Id: 4HTPHW2vgKz3pj2 X-Spamd-Bar: ++ Authentication-Results: mx1.freebsd.org; dkim=none; dmarc=none; spf=pass (mx1.freebsd.org: domain of cmt@burggraben.net designates 88.198.69.140 as permitted sender) smtp.mailfrom=cmt@burggraben.net X-Spamd-Result: default: False [2.49 / 15.00]; ARC_NA(0.00)[]; FREEFALL_USER(0.00)[cmt]; FROM_HAS_DN(0.00)[]; RCPT_COUNT_THREE(0.00)[3]; TO_DN_SOME(0.00)[]; R_SPF_ALLOW(-0.20)[+ip4:88.198.69.140]; MIME_GOOD(-0.10)[text/plain]; DMARC_NA(0.00)[burggraben.net]; NEURAL_SPAM_MEDIUM(0.94)[0.938]; NEURAL_SPAM_SHORT(0.97)[0.966]; TO_MATCH_ENVRCPT_SOME(0.00)[]; NEURAL_SPAM_LONG(0.98)[0.984]; FROM_EQ_ENVFROM(0.00)[]; R_DKIM_NA(0.00)[]; MIME_TRACE(0.00)[0:+]; ASN(0.00)[asn:24940, ipnet:88.198.0.0/16, country:DE]; RCVD_COUNT_TWO(0.00)[2]; RCVD_TLS_ALL(0.00)[]; RCVD_IN_DNSWL_LOW(-0.10)[88.198.69.140:from] X-ThisMailContainsUnwantedMimeParts: N ## Eugene Grosbein (eugen@grosbein.net): > Will I be able to use ssh_config and following command to re-enable > the feature after planned import? I haven't seen it mentioned here, so: now that OpenSSH 8.8 is available, we see that you can in fact re-enable ssh-rsa support: https://www.openssh.com/releasenotes.html "Potentially-incompatible changes" Regards, Christoph -- Spare Space