conflict in host signature checking

[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

 



Hi folks,

AFAICS the recent ssh versions don't support the ssh-rsa signature
algorithm for host keys anymore:

	check_host_cert: certificate signature algorithm ssh-rsa:
	signature algorithm not supported

So I refreshed the host key signatures using	

	ssh-keygen -s ~/.ssh/ca_rsa -t rsa-sha2-256 \
	  -I hostname.example.com -h /tmp/ssh_host_rsa_key.pub

This went well for almost all hosts in my environment, except for an
ancient Solaris 10 host used to checkout and build some very old code
(just in case). The problem on this host is

	% ssh -V
	OpenSSH_6.2p1, OpenSSL 1.0.1r  28 Jan 2016

	% ssh -F /dev/null git
	ssh_rsa_verify: cannot handle type rsa-sha2-256
	cert_parse: Certificate signature verification failed
	key_from_blob: can't parse cert data
	cannot decode server_host_key_blob

	% echo $?
	255

If I put the old signed key back into place on git, then Solaris is
happy, but all other hosts complain as shown above.

Using */bin/ssh -F /dev/null* (i.e. the ancient ssh provided with Solaris10)
there is no problem with an unsupported signature algorithm, so I wonder
if I missed some command line flag to skip the signature verification in
openssh 6.2, as /bin/ssh does? Of course I checked the man page. Please
excuse if I am too blind to see.


Every helpful comment is highly appreciated
Harri
_______________________________________________
openssh-unix-dev mailing list
openssh-unix-dev@xxxxxxxxxxx
https://lists.mindrot.org/mailman/listinfo/openssh-unix-dev



[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

[Index of Archives]     [Linux ARM Kernel]     [Linux ARM]     [Linux Omap]     [Fedora ARM]     [IETF Annouce]     [Security]     [Bugtraq]     [Linux]     [Linux OMAP]     [Linux MIPS]     [ECOS]     [Asterisk Internet PBX]     [Linux API]

  Powered by Linux