Please restore ssh-dsa (was: cvs: Permission denied (publickey).)

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Sat, Aug 23, 2008 at 04:37:13PM -0500, Jeffrey Ollie wrote:
> 2008/8/23 Axel Thimm <Axel.Thimm@xxxxxxxxxx>:
> > On Sat, Aug 23, 2008 at 04:06:07PM -0500, Jeffrey Ollie wrote:
> >> 2008/8/23 Axel Thimm <Axel.Thimm@xxxxxxxxxx>:
> >> >
> >> > I saw that some people are using CVS again, so I tried as well, but I
> >> > got:
> >> >
> >> > athimm@devel(1012):/home/.../smart/devel$ cvs up
> >> > Permission denied (publickey).
> >> > cvs [update aborted]: end of file from server (consult above messages if any)
> >> >
> >> > I have a new FAS password, all certs updated, I even checked the cvs
> >> > procedures for newbies on fpo, but I had no luck. What am I doing
> >> > wrong?
> >>
> >> Did you upload a new SSH public key?
> >
> > It won't let me:
> >
> > Error!
> >
> > The following error(s) have occured with your request:
> >
> >    * ssh_key: Error - Not a valid RSA SSH key: ssh-dss ...
> >
> > Have DSA keys now been banned?
> 
> Yes.
> 
> > Why?
> 
> The primary reason is that it's nearly impossible to tell if the key
> was generated on a Debian system with the compromised OpenSSL
> versions.

That's overreacting. What happens if Gentoo makes a similar mistake
with RSA keys, will we ban them, too? DSA is a decent technology.

> I've heard rumblings that DSA keys are weaker for other reasons, but
> I've not seen any good explanations.

Hearsay, your honour! On the contrary, I've heard that DSA gathers at
1024 bits at least as much entropy as RSA with 2048, and DSA was the
recommended "new" algorithm half a decade ago. Currently RSA and DSA
are equal up.

Please restore the possibility to use DSA. People doing so are
knowledgable enough (DSA is not the default with ssh-keygen) to have
dealt with any keys they may have created on Debian systems during the
time window their rnd gen was bad. If they haven't you won't save them
anyway.

> In any case, it's probably a good idea to regenerate your SSH keys
> every now and then, I know I had been using mine FAR too long.

There are different opinions on this as well. If you access several
dozens of systems scattered world-wide in differently administered
environments you will be glad not to have to change the keys that
often and to use only a few keys, and not one for every host.
-- 
Axel.Thimm at ATrpms.net

Attachment: pgpIQnh9Dv2DG.pgp
Description: PGP signature

_______________________________________________
Fedora-infrastructure-list mailing list
Fedora-infrastructure-list@xxxxxxxxxx
https://www.redhat.com/mailman/listinfo/fedora-infrastructure-list

[Index of Archives]     [Fedora Development]     [Fedora Users]     [Fedora Desktop]     [Fedora SELinux]     [Yosemite News]     [KDE Users]

  Powered by Linux