[conspire] SSH-PKI lol
Nick Moffitt
nick at zork.net
Thu Sep 30 00:51:52 PDT 2021
But if you're interested in pushing SSH cert management along through some delightfully filthy hacks:
https://github.com/mjg59/ssh_pki
On 29Sep2021 11:29pm (-0700), Rick Moen wrote:
> Short answer: no.
>
> ----- Forwarded message from Rick Moen <rick at linuxmafia.com> -----
>
> Date: Wed, 29 Sep 2021 23:28:52 -0700
> From: Rick Moen <rick at linuxmafia.com>
> To: Ruben Safir <ruben at mrbrklyn.com>
> Subject: Re: [artix-general] [mrbrklyn at panix.com: [Hangout - NYLXS] RSA
> finally being put to pasture]
> Organization: If you lived here, you'd be $HOME already.
>
> Quoting Ruben Safir (ruben at mrbrklyn.com):
>
> > With the latest openssh updates, the rsa algorithm is being retired
> > after decades of use
>
> No, it's not.
>
> In fairness, you were relying on Atlassian, and they're grossly
> mistaken.
>
>
> > https://confluence.atlassian.com/bitbucketserverkb/ssh-rsa-key-rejected-with-message-no-mutual-signature-algorithm-1026057701.html
>
> Page says:
>
> Cause
>
> The RSA algorithm is being quickly deprecated across operating systems
> and SSH clients because of various security vulnerabilities, with many
> of these technologies now outright denying the use of this algorithm.
>
> For example - here is the announcement[1] from OpenSSH regarding their
> upcoming deprecation of the ssh-rsa algorithm.
>
> [1] https://www.openssh.com/txt/release-8.2
>
> Yeah, that's the "ssh-rsa" algorithm, a _certificate signature_
> algorithm for RSA keys -- and it's being deprecated because of
> longstanding flaws in the SHA-1 hash algorithm, _not_ in the RSA
> public-key cipher.
>
> As the OpenSSH release notes point out, superior _signature_
> algorithms include rsa-sha2-256 and rsa-sha2-512, which, you'll
> note, are combinations of RSA keys with SHA2 digest (hash) algorithms.
>
> Accordingly, OpenSSH is removing "ssh-rsa" from (RSA/SHA1) the accepted
> CASignatureAlgorithms list -- but is not removing anything about or
> concerning RSA, only concerning SHA1.
>
> The dolts^W kind people at Atlassian don't seem to have bothered to
> actually read the page they cited.
>
> The dropping of "ssh-rsa" _signatures_ from the _certificate signature_
> list on the ssh client side may be a pain in the neck. If that happens
> to you, you can add it back to $HOME/.ssh/config 's
> CASignatureAlgorithms line, for the time being. In the longer term,
> yes, SHA1 is overdue to die.
>
> More at:
> https://security.stackexchange.com/questions/255074/why-are-rsa-sha2-512-and-rsa-sha2-256-supported-but-not-reported-by-ssh-q-key
>
>
>
> ----- End forwarded message -----
>
> _______________________________________________
> conspire mailing list
> conspire at linuxmafia.com
> http://linuxmafia.com/mailman/listinfo/conspire
More information about the conspire
mailing list