[conspire] SSH-PKI lol

Nick Moffitt nick at zork.net
Thu Sep 30 00:51:52 PDT 2021


But if you're interested in pushing SSH cert management along through some delightfully filthy hacks:

	https://github.com/mjg59/ssh_pki


On 29Sep2021 11:29pm (-0700), Rick Moen wrote:
> Short answer: no.
> 
> ----- Forwarded message from Rick Moen <rick at linuxmafia.com> -----
> 
> Date: Wed, 29 Sep 2021 23:28:52 -0700
> From: Rick Moen <rick at linuxmafia.com>
> To: Ruben Safir <ruben at mrbrklyn.com>
> Subject: Re: [artix-general] [mrbrklyn at panix.com: [Hangout - NYLXS] RSA
> 	finally being put to pasture]
> Organization: If you lived here, you'd be $HOME already.
> 
> Quoting Ruben Safir (ruben at mrbrklyn.com):
> 
> > With the latest openssh updates, the rsa algorithm is being retired
> > after decades of use
> 
> No, it's not.
> 
> In fairness, you were relying on Atlassian, and they're grossly
> mistaken.
> 
> 
> > https://confluence.atlassian.com/bitbucketserverkb/ssh-rsa-key-rejected-with-message-no-mutual-signature-algorithm-1026057701.html
> 
> Page says:
> 
>   Cause
> 
>   The RSA algorithm is being quickly deprecated across operating systems
>   and SSH clients because of various security vulnerabilities, with many
>   of these technologies now outright denying the use of this algorithm.
> 
>   For example - here is the announcement[1] from OpenSSH regarding their
>   upcoming deprecation of the ssh-rsa algorithm.
> 
>   [1] https://www.openssh.com/txt/release-8.2
> 
> Yeah, that's the "ssh-rsa" algorithm, a _certificate signature_
> algorithm for RSA keys -- and it's being deprecated because of
> longstanding flaws in the SHA-1 hash algorithm, _not_ in the RSA
> public-key cipher.
> 
> As the OpenSSH release notes point out, superior _signature_ 
> algorithms include rsa-sha2-256 and rsa-sha2-512, which, you'll
> note, are combinations of RSA keys with SHA2 digest (hash) algorithms.
> 
> Accordingly, OpenSSH is removing "ssh-rsa" from (RSA/SHA1) the accepted
> CASignatureAlgorithms list -- but is not removing anything about or
> concerning RSA, only concerning SHA1.
> 
> The dolts^W kind people at Atlassian don't seem to have bothered to
> actually read the page they cited.
> 
> The dropping of "ssh-rsa" _signatures_ from the _certificate signature_
> list on the ssh client side may be a pain in the neck.  If that happens
> to you, you can add it back to $HOME/.ssh/config 's
> CASignatureAlgorithms line, for the time being.  In the longer term, 
> yes, SHA1 is overdue to die.
> 
> More at:
> https://security.stackexchange.com/questions/255074/why-are-rsa-sha2-512-and-rsa-sha2-256-supported-but-not-reported-by-ssh-q-key
> 
> 
> 
> ----- End forwarded message -----
> 
> _______________________________________________
> conspire mailing list
> conspire at linuxmafia.com
> http://linuxmafia.com/mailman/listinfo/conspire



More information about the conspire mailing list