Call for testing: OpenSSH 8.2

Darren Tucker dtucker at dtucker.net
Thu Feb 6 13:28:59 AEDT 2020


On Thu, Feb 06, 2020 at 01:23:09PM +1100, Darren Tucker wrote:
[...]
> Those are "sign only" algorithms that use the same RSA keys but with a
> stronger signature algorithms.  It looks like the advice in
> sshd_config(5) is not accurate (I think ssh -Q needs an option that
> calls sshkey_alg_list with certs_only=0, plain_only=0 and
> include_sigonly=1 for this case).

Like this.

diff --git a/ssh.c b/ssh.c
index 35972fe3..98099295 100644
--- a/ssh.c
+++ b/ssh.c
@@ -750,6 +750,8 @@ main(int ac, char **av)
 				cp = sshkey_alg_list(1, 0, 0, '\n');
 			else if (strcmp(optarg, "key-plain") == 0)
 				cp = sshkey_alg_list(0, 1, 0, '\n');
+			else if (strcmp(optarg, "key-sig") == 0)
+				cp = sshkey_alg_list(0, 0, 1, '\n');
 			else if (strcmp(optarg, "sig") == 0)
 				cp = sshkey_alg_list(0, 1, 1, '\n');
 			else if (strcmp(optarg, "protocol-version") == 0)
@@ -763,7 +765,7 @@ main(int ac, char **av)
 			} else if (strcmp(optarg, "help") == 0) {
 				cp = xstrdup(
 				    "cipher\ncipher-auth\ncompression\nkex\n"
-				    "key\nkey-cert\nkey-plain\nmac\n"
+				    "key\nkey-cert\nkey-plain\nkey-sig\nmac\n"
 				    "protocol-version\nsig");
 			}
 			if (cp == NULL)
diff --git a/sshd_config.5 b/sshd_config.5
index 0684300f..465ee53d 100644
--- a/sshd_config.5
+++ b/sshd_config.5
@@ -776,7 +776,7 @@ rsa-sha2-512,rsa-sha2-256,ssh-rsa
 .Ed
 .Pp
 The list of available key types may also be obtained using
-.Qq ssh -Q key .
+.Qq ssh -Q key-sig .
 .It Cm IgnoreRhosts
 Specifies that
 .Pa .rhosts

-- 
Darren Tucker (dtucker at dtucker.net)
GPG key 11EAA6FA / A86E 3E07 5B19 5880 E860  37F4 9357 ECEF 11EA A6FA (new)
    Good judgement comes with experience. Unfortunately, the experience
usually comes from bad judgement.


More information about the openssh-unix-dev mailing list