| Summary: | Not possible to disable rsa-sha2-512 in sshd | ||
|---|---|---|---|
| Product: | Portable OpenSSH | Reporter: | Pierre Ossman <ossman> |
| Component: | sshd | Assignee: | Assigned to nobody <unassigned-bugs> |
| Status: | NEW --- | ||
| Severity: | normal | CC: | djm |
| Priority: | P5 | ||
| Version: | -current | ||
| Hardware: | Other | ||
| OS: | Linux | ||
|
Description
Pierre Ossman
2021-09-21 00:51:19 AEST
It's tricky, because PubkeyAcceptedAlgorithms can be overridden by a sshd_config Match block that is evaluated during user authentication, i.e. well after key exchange completes. Can you avoid this on the client side by setting PubkeyAcceptedAlgorithms there? Possibly. Hopefully we can get rid of the old cards and side step the whole thing. We're just exploring options, and a server side config would have been the most robust approach. :) |