Legacy option for key length?

Dan Mahoney (Gushi) danm at prime.gushi.org
Fri Dec 29 16:31:28 AEDT 2017


All,

I occasionally manage some APC PDU devices.  I manage them via a VPN, 
which enforces super-heavy crypto, and their access is restricted to only 
jumphosts and the VPN.  Basically, the only time you need to log into 
these is when you go to reboot something that's down.

Their web UI with SSL doesn't work with modern browsers.
Their CPU is...tiny, and their SSHd implementation is...old (and, I 
believe, proprietary).

I think it defaults to RSA768, and even then, takes a good 15 seconds to 
let you log in.

When trying to SSH to them most recently from a recent copy of MacOS, I 
got the "Invalid Key Length" error.

I googled around for the release note and the source code commit that had 
produced this, and then tried looking for workarounds here: 
https://www.openssh.com/legacy.html

After all, since the OpenSSH devs think carefully enough to have a page 
that documents legacy options, for sure they thought of one for this case 
too, right?  It doesn't seem so.

My workaround was, insanely, to fire up a VM with an older version of an 
OS with an older openSSH client.

So...

Why not make minimum key length a tunable, just as the other options are?

In this way, sites with a more strict policy could actually specify it 
(i.e. RSA2048 or better)

Perhaps if you're dead-set on this being so dangerous, you could make it 
so that you could specify a command-line option to accept a lower value 
one time, but you're perhaps not able to override it via the config.

Thanks,

-Dan

-- 



More information about the openssh-unix-dev mailing list