Strange crypto choices

Damien Miller djm at
Sun May 27 12:09:43 AEST 2018

On Sat, 26 May 2018, Christian Weisgerber wrote:

> On 2018-05-25, Yegor Ievlev <koops1997 at> wrote:
> > The defaults for HostKeyAlgorithms option are: [...]
> > Why does OpenSSH prefer older and less secure
> > ( ECDSA with NIST curves over Ed25519?
> I asked Markus and Damien about this in the past but honestly don't
> remember the answer.  Some of the potential reasons (lack of
> standardization, no DNS fingerprint, ...) seem to no longer apply.
> I've been wanting to hassle Markus and Damien about this again,
> once I run into them in person, but that opportunity hasn't presented
> itself yet.

Yeah, there's no RFC for ed25519 keys yet. There's an I-D in progress at

Christian is right about our reasoning for the other choices.


More information about the openssh-unix-dev mailing list