[Bug 2568] ssh fails to authenticate using RSA keys when agent does not support sha256/512 signatures
bugzilla-daemon at bugzilla.mindrot.org
bugzilla-daemon at bugzilla.mindrot.org
Sat May 21 04:28:10 AEST 2016
https://bugzilla.mindrot.org/show_bug.cgi?id=2568
Kenny Root <kenny at the-b.org> changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |kenny at the-b.org
--- Comment #2 from Kenny Root <kenny at the-b.org> ---
This works, but the verbose output makes it seem like it's still using
rsa-sha2-512 which is misleading:
debug1: matching key found: file /home/tester/.ssh/authorized_keys,
line 5 RSA SHA256:....
debug1: restore_uid: 0/0
debug1: do_pam_account: called
Accepted publickey for kenny from 127.0.0.1 port 44220 ssh2: RSA
SHA256:....
debug1: monitor_child_preauth: tester has been authenticated by
privileged process
debug2: userauth_pubkey: authenticated 1 pkalg rsa-sha2-512 [preauth]
debug1: monitor_read_log: child log fd closed
debug1: temporarily_use_uid: 31337/31337 (e=0/0)
debug1: ssh_gssapi_storecreds: Not a GSSAPI mechanism
debug1: restore_uid: 0/0
debug1: PAM: establishing credentials
User child is on pid 8418
debug1: SELinux support enabled
debug1: PAM: establishing credentials
debug1: permanently_set_uid: 31337/31337
--
You are receiving this mail because:
You are watching the reporter of the bug.
You are watching the assignee of the bug.
More information about the openssh-bugs
mailing list