[
https://issues.apache.org/jira/browse/SSHD-1254?focusedWorklogId=746223&page=com.atlassian.jira.plugin.system.issuetabpanels:worklog-tabpanel#worklog-746223
]
ASF GitHub Bot logged work on SSHD-1254:
----------------------------------------
Author: ASF GitHub Bot
Created on: 22/Mar/22 22:41
Start Date: 22/Mar/22 22:41
Worklog Time Spent: 10m
Work Description: tomaswolf commented on pull request #213:
URL: https://github.com/apache/mina-sshd/pull/213#issuecomment-1075722506
> I'll have to see if I can set up a container test using an OpenSSH 8.9
server.
alpine:3.15 seems to be the newest Alpine, but apk only gives me OpenSSH
8.8p1. The extension is available only as of 8.9p1. See the [OpenSSH release
notes](https://www.openssh.com/releasenotes.html). So currently I cannot write
any test for this.
--
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.
To unsubscribe, e-mail: [email protected]
For queries about this service, please contact Infrastructure at:
[email protected]
Issue Time Tracking
-------------------
Worklog Id: (was: 746223)
Time Spent: 1h (was: 50m)
> Support host-based pubkey authentication in the client
> ------------------------------------------------------
>
> Key: SSHD-1254
> URL: https://issues.apache.org/jira/browse/SSHD-1254
> Project: MINA SSHD
> Issue Type: Improvement
> Affects Versions: 2.8.0
> Reporter: Thomas Wolf
> Assignee: Thomas Wolf
> Priority: Minor
> Time Spent: 1h
> Remaining Estimate: 0h
>
> This is a variation of the normal pubkey authentication that also includes
> the server's public host key in the SSH_MSG_USERAUTH_REQUEST message.
> See
> * [https://www.openssh.com/agent-restrict.html#authverify]
> * [https://github.com/openssh/openssh-portable/blob/807be686/PROTOCOL#L347]
--
This message was sent by Atlassian Jira
(v8.20.1#820001)
---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]