[Bug 2547] New: ssh-ext-info: missing server signature algorithms
bugzilla-daemon at bugzilla.mindrot.org
bugzilla-daemon at bugzilla.mindrot.org
Thu Mar 3 09:54:57 AEDT 2016
https://bugzilla.mindrot.org/show_bug.cgi?id=2547
Bug ID: 2547
Summary: ssh-ext-info: missing server signature algorithms
Product: Portable OpenSSH
Version: 7.2p1
Hardware: All
OS: All
Status: NEW
Severity: normal
Priority: P5
Component: sshd
Assignee: unassigned-bugs at mindrot.org
Reporter: mb at smartftp.com
In the "server-sig-algs" extension the server sends to the client, sshd
only includes the rsa signature algorithms [1]:
(r = sshpkt_put_cstring(ssh, "rsa-sha2-256,rsa-sha2-512")) != 0 ||
However, it should include all signature algorithms (including
ecdsa-sha2-*, ssh-ed25519, etc) it supports.
This is what the RFC [2] says:
string "server-sig-algs"
This extension is sent by the server only, and contains a list of
signature algorithms that the server is able to process as part of a
"publickey" request.
You may have incorrectly assumed that there is only 1 signature
algorithm for the omitted public key algorithms. For example for ECDSA
private keys there are at least two known signature algorithms:
ecdsa-sha2-nistp256
x509v3-ecdsa-sha2-nistp256 (from rfc6187)
References:
[1] https://github.com/openssh/openssh-portable/blob/master/kex.c#L344
[2] https://tools.ietf.org/html/draft-ssh-ext-info-05#section-3.1
--
You are receiving this mail because:
You are watching the assignee of the bug.
More information about the openssh-bugs
mailing list