Call for testing: OpenSSH 8.2
Damien Miller
djm at mindrot.org
Thu Feb 6 15:18:26 AEDT 2020
On Thu, 6 Feb 2020, Darren Tucker wrote:
> On Thu, Feb 06, 2020 at 01:23:09PM +1100, Darren Tucker wrote:
> [...]
> > Those are "sign only" algorithms that use the same RSA keys but with a
> > stronger signature algorithms. It looks like the advice in
> > sshd_config(5) is not accurate (I think ssh -Q needs an option that
> > calls sshkey_alg_list with certs_only=0, plain_only=0 and
> > include_sigonly=1 for this case).
>
> Like this.
>
> diff --git a/ssh.c b/ssh.c
> index 35972fe3..98099295 100644
> --- a/ssh.c
> +++ b/ssh.c
> @@ -750,6 +750,8 @@ main(int ac, char **av)
> cp = sshkey_alg_list(1, 0, 0, '\n');
> else if (strcmp(optarg, "key-plain") == 0)
> cp = sshkey_alg_list(0, 1, 0, '\n');
> + else if (strcmp(optarg, "key-sig") == 0)
> + cp = sshkey_alg_list(0, 0, 1, '\n');
> else if (strcmp(optarg, "sig") == 0)
> cp = sshkey_alg_list(0, 1, 1, '\n');
> else if (strcmp(optarg, "protocol-version") == 0)
> @@ -763,7 +765,7 @@ main(int ac, char **av)
> } else if (strcmp(optarg, "help") == 0) {
> cp = xstrdup(
> "cipher\ncipher-auth\ncompression\nkex\n"
> - "key\nkey-cert\nkey-plain\nmac\n"
> + "key\nkey-cert\nkey-plain\nkey-sig\nmac\n"
> "protocol-version\nsig");
> }
> if (cp == NULL)
> diff --git a/sshd_config.5 b/sshd_config.5
> index 0684300f..465ee53d 100644
> --- a/sshd_config.5
> +++ b/sshd_config.5
> @@ -776,7 +776,7 @@ rsa-sha2-512,rsa-sha2-256,ssh-rsa
> .Ed
> .Pp
> The list of available key types may also be obtained using
> -.Qq ssh -Q key .
> +.Qq ssh -Q key-sig .
> .It Cm IgnoreRhosts
> Specifies that
> .Pa .rhosts
oops, yes - ok djm
More information about the openssh-unix-dev
mailing list