Settable minimum RSA key sizes on the client end for legacy devices.

Steve Sether steve at sether.org
Fri Dec 27 07:27:22 AEDT 2019


Yes, I considered re-compiling, but it just seemed like an enormous pain 
to have to go through the source and figure out where the key size limit 
was.  It also occurred to me that I'm likely not the only one with this 
problem, but many just didn't understand what the underlying problem 
was, and more wouldn't know where to go to talk about addressing it.  
95% of the administrators of the world are just going to enable telnet, 
and be done with it.  You have to remember that one person reporting a 
bug or requested feature represents many, many more that never caught 
it, or didn't know how to report it, or (as above) found another workaround.

I also tried looking for other clients that might support lower sized 
keys.  putty seems to blow up because of the buggy ssh implementation of 
the server that openSSH kindly deals with. There's some other 
implementations that I didn't want to pay for just to see if they worked.

On 12/26/19 8:08 AM, Philipp Marek wrote:
>
>>> I'd rather not dredge up a big fight, but I _would_ like to express a
>>> desire for some form of overriding the minimum key size.
>>
>> This can be done by recompiling if necessary. This restriction has been
>> a pain for me at times but honestly I think it's for the best that it's
>> been done.
>
> I may be alone with that opinion, but for such things I've always hoped
> for a global _variable_ whose location is available as a dynamic symbol
> in the ELF - so instead of getting all the sources (and all their
> dependencies, resp. the headers etc.) and reconfiguring (with all
> required research to get the right options) and recompiling, a 1-minute
> session with a hex editor to patch the 2 bytes would be enough...
>
>
> Yeah, some distributions make recompilation much easier (Debian has
> "apt-get source") - but still it's much more work than switching a few
> bytes.


More information about the openssh-unix-dev mailing list