Bug 2506

Summary: CA-signed keys broken
Product: Portable OpenSSH Reporter: John Runyon <watt.john.runyon>
Component: sshAssignee: Assigned to nobody <unassigned-bugs>
Status: CLOSED WONTFIX    
Severity: normal CC: djm
Priority: P5    
Version: 7.1p1   
Hardware: All   
OS: Linux   
Attachments:
Description Flags
ssh -vvv output none

Description John Runyon 2015-11-26 05:40:51 AEDT
Created attachment 2757 [details]
ssh -vvv output

After upgrading from 6.9 to 7.1, CA-signed keys are broken. ssh fails to verify a CA-signed host key and fails to load/use a CA-signed user key. Attached output of ssh -vvv. Note particularly lines 9-10, 68-71.
Comment 1 Damien Miller 2015-11-28 11:24:04 AEDT
The server in question is offering the legacy certificate format that was removed in OpenSSH 7.0

> debug2: kex_parse_kexinit: ssh-rsa,ssh-rsa-cert-v00@openssh.com,ssh-dss

The legacy keys haven't been the default since OpenSSH 5.6.

The remote version (OpenSSH 6.0) supports the current cert format fine, so regenerating your certificates should get you working.
Comment 2 Damien Miller 2016-08-02 10:41:58 AEST
Close all resolved bugs after 7.3p1 release