no mutual signature algorithm with RSA user certs client 7.8, server 7.4

Damien Miller djm at mindrot.org
Thu Oct 11 13:02:46 AEDT 2018


applied - thanks

On Thu, 11 Oct 2018, Adam Eijdenberg wrote:

> On Thu, Oct 11, 2018 at 12:19 PM Damien Miller <djm at mindrot.org> wrote:
> > No, I think I figured it out :)
> 
> Thanks again for your help. I think there are still 2 more sets of
> duplicated lines that can go. ie I think we can delete:
> 
> diff --git a/sshkey.c b/sshkey.c
> index 21e61a2c..6555c5ef 100644
> --- a/sshkey.c
> +++ b/sshkey.c
> @@ -124,10 +124,6 @@ static const struct keytype keytypes[] = {
>             "rsa-sha2-512", KEY_RSA_CERT, 0, 1, 1 },
>         { "ssh-dss-cert-v01 at openssh.com", "DSA-CERT", NULL,
>             KEY_DSA_CERT, 0, 1, 0 },
> -       { "ssh-rsa-cert-v01 at openssh.com", "RSA-CERT", NULL,
> -           KEY_RSA_CERT, 0, 1, 0 },
> -       { "ssh-dss-cert-v01 at openssh.com", "DSA-CERT", NULL,
> -           KEY_DSA_CERT, 0, 1, 0 },
>  # ifdef OPENSSL_HAS_ECC
>         { "ecdsa-sha2-nistp256-cert-v01 at openssh.com", "ECDSA-CERT", NULL,
>             KEY_ECDSA_CERT, NID_X9_62_prime256v1, 1, 0 },
> 


More information about the openssh-unix-dev mailing list