| Summary: | Server Authentication when both RSA and DSA are enabled (on the server) | ||
|---|---|---|---|
| Product: | Portable OpenSSH | Reporter: | petfire85 |
| Component: | ssh | Assignee: | Assigned to nobody <unassigned-bugs> |
| Status: | CLOSED WONTFIX | ||
| Severity: | trivial | CC: | djm |
| Priority: | P2 | ||
| Version: | 5.2p1 | ||
| Hardware: | All | ||
| OS: | All | ||
|
Description
petfire85
2009-10-02 06:49:01 AEST
As of OpenSSH-5.7, the ssh client will not automatically prefer to use host key types that it actually has hostkeys for. So it should automatically do the right thing and avoid hostkey warnings if the server advertises things in a different way. Unfortunately, the SSH protocol can only attempt one hostkey type per connection and has no way for a server to tell a client its full list of hostkeys. We might look at making a protocol extension in the future to allow the server to tell the client of its full list of hostkeys. For now, you should let the client select the host key algorithm automatically and it will do the right thing. If you want to override the host key algorithm, then it is your responsibility to obtain the other host keys and place them in known_hosts (either manually or by accepting the "new hostkey" message) err, that should read "As of OpenSSH-5.7, the ssh client will *now* automatically" (i.e. not "not automatically") close resolved bugs now that openssh-5.9 has been released |