| Summary: | Disabling just rsa-sha2-512 breaks public key authentication | ||
|---|---|---|---|
| Product: | Portable OpenSSH | Reporter: | Pierre Ossman <ossman> |
| Component: | Miscellaneous | Assignee: | Assigned to nobody <unassigned-bugs> |
| Status: | NEW --- | ||
| Severity: | enhancement | CC: | djm |
| Priority: | P5 | ||
| Version: | 7.9p1 | ||
| Hardware: | Other | ||
| OS: | Linux | ||
|
Description
Pierre Ossman
2019-01-23 21:43:43 AEDT
AFAIK there's no way in the protocol to handle this. The server can signal what public key algorithms it supports to the client, but that list is shared between both publickey and hostbased authentication methods. A potential workaround might be to take the union of the enabled signature algorithms for both and send that, but unfortunately we don't know which methods are enabled until too late because of the Match directive in sshd_config - they are evaluated after the supported-sig-algs message is sent... |