Date: Sun, 11 May 2025 12:20:05 +0100 From: void <void@f-m.fm> To: freebsd-security@freebsd.org Subject: Re: Heads-up: DSA key support being removed from OpenSSH Message-ID: <aCCH5VSOgkX1dpOT@int21h> In-Reply-To: <p992nn1n-p9n2-s64o-9666-o5on62nnor7s@yvfgf.mnoonqbm.arg> References: <CAPyFy2Dk0VoqLPSHxTLzBCWT_ouqU_kj4QNhN17VybMinbr6bA@mail.gmail.com> <76933d66-eff5-4d43-a7a6-98a153e71d77@rlwinm.de> <CAPyFy2DAk8wx34gEJs7L94NykyMDBzAjLo9TwQOa_SPVvEFQ3A@mail.gmail.com> <p992nn1n-p9n2-s64o-9666-o5on62nnor7s@yvfgf.mnoonqbm.arg>
index | next in thread | previous in thread | raw e-mail
On Thu, Apr 10, 2025 at 10:24:49PM +0000, Bjoern A. Zeeb wrote: > >Is there any chance to keep an openssh (client) port (possibly with known >security risks)? +1 to this. Just the client. Maybe call it openssh-vuln? I can appreciate it being removed in base, in server. But there's lots of otherwise-working gear around that only uses ssh-dss or ssh-rsa. We only need the client. --home | help
Want to link to this message? Use this
URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?aCCH5VSOgkX1dpOT>
