Question regarding Host keys.

[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

 



Hi,

I'm having a problem when I add "HostKeyAlgorithms +ssh-dss" to the
ssh_config file the host key will always negotiate to a wrong one. In my
case it will negotiate to "ecdsa-sha2-nistp256". The client was already
configured with the servers rsa public key, before the change I added to
the ssh_config file I could see from the debug that server and client will
negotiate to use ssh-rsa as expected. After change unfortunately the client
and server will negotiate to use ecdsa-sha2-nistp256, then later will
complain "REMOTE HOST IDENTIFICATION HAS CHANGED" and fail. I got around
this by adding the ecdsa public key to the know hosts.

After some instigation I noticed that before my change the host keys will
reorder to use the rsa based ones first and the others after, but not after
my change. So, I would like to know is there a reason for not allowing the
keys to reorder after specifying them in the ssh_config file, and will this
behaviour be changed in an upcoming release. I think it would be nice to
reorder the host keys even when they from the config file.

Thanks,
Mahoda
_______________________________________________
openssh-unix-dev mailing list
openssh-unix-dev@xxxxxxxxxxx
https://lists.mindrot.org/mailman/listinfo/openssh-unix-dev



[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

[Index of Archives]     [Linux ARM Kernel]     [Linux ARM]     [Linux Omap]     [Fedora ARM]     [IETF Annouce]     [Security]     [Bugtraq]     [Linux]     [Linux OMAP]     [Linux MIPS]     [ECOS]     [Asterisk Internet PBX]     [Linux API]

  Powered by Linux