Based on our Fedora bug [1] I started investigation what is up to with the new Fingerprint hashes in openssh-6.8. I found one inconsistency and a usability problem. 1) First of all manual pages mention that: > Valid options are: “md5” and “sha256”. but both config parser and all tools accepts ALL digests defined in "digest-{openssl,glibc}.c" in array digests[], which contains much more of them and which do not have any support and can lead to misunderstanding. I propose to strip the list according to documentation. But it collides a bit with the other proposal: 2) As I stated in previously mentioned bugzilla, it would be great to have the way to show more Fingerprint types, since the most of the servers still provide only the old fingerprint (and for some years probably will). Also it is not preferable to stuck with old md5 as default. You can admit, that users can always do $ ssh server -oFingerprintHash=md5 but it is probably too much for users if they really want to verify fingerpring provided through other channel. My proposal is to add ability to provide a list of digest that will be printed (not only one) and as a transition default use both available: "sha256,md5". I don't have a patch yet, but if there would be some idea how can we make the transition more smooth, feel free to comment. [1] https://bugzilla.redhat.com/show_bug.cgi?id=1249626
Created attachment 2681 [details] Allow more fingerprint algorithms on client side Adding patch for client side, which introduces new default "sha256 md5". For internal operations and logging, only the first one is used, but for interaction with user (adding new host), both fingerprints are printed. From my point of view, there is no need to do the same on the server side, since there is no interaction with user.
Retarget to openssh-7.3
retarget unfinished bugs to next release
OpenSSH 7.4 release is closing; punt the bugs to 7.5
Move incomplete bugs to openssh-7.6 target since 7.5 shipped a while back. To calibrate expectations, there's little chance all of these are going to make 7.6.
remove 7.5 target
Move to OpenSSH 7.8 tracking bug
Retarget remaining bugs planned for 7.8 release to 7.9
Retarget unfinished bugs to OpenSSH 8.0
I don't think I want to move forward with this change - the sha256 signatures are a lot more ubiquitous and accepted than they were in 2016 and I want to hasten the day when OpenSSH and its dependencies can compile without any MD5 support at all.
closing resolved bugs as of 8.6p1 release