Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 11 May 2025 18:10:35 +0200
From:      Christian Weisgerber <naddy@mips.inka.de>
To:        freebsd-security@freebsd.org
Subject:   Re: Heads-up: DSA key support being removed from OpenSSH
Message-ID:  <aCDL-2e0qe995uG3@lorvorc.mips.inka.de>
In-Reply-To: <aCCH5VSOgkX1dpOT@int21h>
References:  <CAPyFy2Dk0VoqLPSHxTLzBCWT_ouqU_kj4QNhN17VybMinbr6bA@mail.gmail.com> <76933d66-eff5-4d43-a7a6-98a153e71d77@rlwinm.de> <CAPyFy2DAk8wx34gEJs7L94NykyMDBzAjLo9TwQOa_SPVvEFQ3A@mail.gmail.com> <p992nn1n-p9n2-s64o-9666-o5on62nnor7s@yvfgf.mnoonqbm.arg> <aCCH5VSOgkX1dpOT@int21h>

index | next in thread | previous in thread | raw e-mail

void:

> +1 to this. Just the client. Maybe call it openssh-vuln?
> 
> I can appreciate it being removed in base, in server. But there's
> lots of otherwise-working gear around that only uses
> ssh-dss or ssh-rsa. We only need the client.

ssh-rsa, i.e. RSA keys with a signature algorithm that uses SHA-1,
is still supported in the latest OpenSSH, even if disabled by
default.

-- 
Christian "naddy" Weisgerber                          naddy@mips.inka.de


home | help

Want to link to this message? Use this
URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?aCDL-2e0qe995uG3>