| Summary: | New sha256-base64 SSH Fingerprints in openssh-6.8 | ||||||
|---|---|---|---|---|---|---|---|
| Product: | Portable OpenSSH | Reporter: | Jakub Jelen <jjelen> | ||||
| Component: | Miscellaneous | Assignee: | Assigned to nobody <unassigned-bugs> | ||||
| Status: | CLOSED WONTFIX | ||||||
| Severity: | enhancement | CC: | djm | ||||
| Priority: | P5 | ||||||
| Version: | 6.9p1 | ||||||
| Hardware: | Other | ||||||
| OS: | Linux | ||||||
| Bug Depends on: | |||||||
| Bug Blocks: | 2915 | ||||||
| Attachments: |
|
||||||
|
Description
Jakub Jelen
2015-08-06 00:26:32 AEST
Created attachment 2681 [details]
Allow more fingerprint algorithms on client side
Adding patch for client side, which introduces new default "sha256 md5". For internal operations and logging, only the first one is used, but for interaction with user (adding new host), both fingerprints are printed.
From my point of view, there is no need to do the same on the server side, since there is no interaction with user.
Retarget to openssh-7.3 Retarget to openssh-7.3 retarget unfinished bugs to next release retarget unfinished bugs to next release retarget unfinished bugs to next release retarget unfinished bugs to next release OpenSSH 7.4 release is closing; punt the bugs to 7.5 Move incomplete bugs to openssh-7.6 target since 7.5 shipped a while back. To calibrate expectations, there's little chance all of these are going to make 7.6. remove 7.5 target Move to OpenSSH 7.8 tracking bug Retarget remaining bugs planned for 7.8 release to 7.9 Retarget remaining bugs planned for 7.8 release to 7.9 Retarget unfinished bugs to OpenSSH 8.0 Retarget unfinished bugs to OpenSSH 8.0 Retarget unfinished bugs to OpenSSH 8.0 I don't think I want to move forward with this change - the sha256 signatures are a lot more ubiquitous and accepted than they were in 2016 and I want to hasten the day when OpenSSH and its dependencies can compile without any MD5 support at all. closing resolved bugs as of 8.6p1 release |