We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Looks to me the sshpiper relies on old SSH public key crypto. algorithms, which are/might be already disabled in current distributions:
sshpiper
E.g.,
$ ssh app1@localhost -p 2222 -vvv ... debug1: Offering public key: /root/.ssh/id_rsa RSA SHA256:XXX debug1: send_pubkey_test: no mutual signature algorithm ... debug1: No more authentication methods to try. app1@localhost: Permission denied (publickey).
When I enable old ssh-rsa keys types, it works:
ssh-rsa
$ ssh app1@localhost -p 2222 -o 'PubkeyAcceptedKeyTypes +ssh-rsa' -vvv ... debug1: Offering public key: /root/.ssh/id_rsa RSA SHA256:XXX debug3: send packet: type 50 debug2: we sent a publickey packet, wait for reply debug3: receive packet: type 60 debug1: Server accepts key: /root/.ssh/id_rsa RSA SHA256:XXX ... app1-65fbd646-ln74g:~$
Since OpenSSH 8.2 (02/2020) the ssh-rsa is disabled. https://www.openssh.com/txt/release-8.2
The text was updated successfully, but these errors were encountered:
same as in #80 ?
Sorry, something went wrong.
this is a client side behavior ssh blocked ssh-rsa and did not even send anything to server
however, sshpiper is not blocking rsa at the moment
No branches or pull requests
Looks to me the
sshpiper
relies on old SSH public key crypto. algorithms, which are/might be already disabled in current distributions:E.g.,
When I enable old
ssh-rsa
keys types, it works:Since OpenSSH 8.2 (02/2020) the
ssh-rsa
is disabled. https://www.openssh.com/txt/release-8.2The text was updated successfully, but these errors were encountered: