Call for testing: OpenSSH 8.2
Darren Tucker
dtucker at dtucker.net
Thu Feb 6 13:28:59 AEDT 2020
On Thu, Feb 06, 2020 at 01:23:09PM +1100, Darren Tucker wrote:
[...]
> Those are "sign only" algorithms that use the same RSA keys but with a
> stronger signature algorithms. It looks like the advice in
> sshd_config(5) is not accurate (I think ssh -Q needs an option that
> calls sshkey_alg_list with certs_only=0, plain_only=0 and
> include_sigonly=1 for this case).
Like this.
diff --git a/ssh.c b/ssh.c
index 35972fe3..98099295 100644
--- a/ssh.c
+++ b/ssh.c
@@ -750,6 +750,8 @@ main(int ac, char **av)
cp = sshkey_alg_list(1, 0, 0, '\n');
else if (strcmp(optarg, "key-plain") == 0)
cp = sshkey_alg_list(0, 1, 0, '\n');
+ else if (strcmp(optarg, "key-sig") == 0)
+ cp = sshkey_alg_list(0, 0, 1, '\n');
else if (strcmp(optarg, "sig") == 0)
cp = sshkey_alg_list(0, 1, 1, '\n');
else if (strcmp(optarg, "protocol-version") == 0)
@@ -763,7 +765,7 @@ main(int ac, char **av)
} else if (strcmp(optarg, "help") == 0) {
cp = xstrdup(
"cipher\ncipher-auth\ncompression\nkex\n"
- "key\nkey-cert\nkey-plain\nmac\n"
+ "key\nkey-cert\nkey-plain\nkey-sig\nmac\n"
"protocol-version\nsig");
}
if (cp == NULL)
diff --git a/sshd_config.5 b/sshd_config.5
index 0684300f..465ee53d 100644
--- a/sshd_config.5
+++ b/sshd_config.5
@@ -776,7 +776,7 @@ rsa-sha2-512,rsa-sha2-256,ssh-rsa
.Ed
.Pp
The list of available key types may also be obtained using
-.Qq ssh -Q key .
+.Qq ssh -Q key-sig .
.It Cm IgnoreRhosts
Specifies that
.Pa .rhosts
--
Darren Tucker (dtucker at dtucker.net)
GPG key 11EAA6FA / A86E 3E07 5B19 5880 E860 37F4 9357 ECEF 11EA A6FA (new)
Good judgement comes with experience. Unfortunately, the experience
usually comes from bad judgement.
More information about the openssh-unix-dev
mailing list