tomaswolf commented on issue #531:
URL: https://github.com/apache/mina-sshd/issues/531#issuecomment-2233155209

   Actually, I remember now that we ran into this long ago in JGit already. The 
approach taken there was simply "if you need to connect with RSA keys to legacy 
servers that don't support rsa-sha2*, then define "ssh-rsa" explicitly as 
signature algorithm to be used for connections to that server". Plus JGit 
implemented the SSH config 
[PubkeyAcceptedAlgorithms](https://man.openbsd.org/ssh_config#PubkeyAcceptedAlgorithms)
 to make easy for users to do so.
   
   That's perhaps an even better approach. Using the negotiated host key 
signature type would only work if the host key was also an RSA key.
   
   In other words: everything works as designed; configure "ssh-rsa" explicitly 
to connect to such legacy servers.
   
   Another approach is not to take advantage of the quoted permission from 
RFC8332 and _always_ fall back to the unsafe "ssh-rsa" unless the server sent a 
"server-sig-algs" extension message with the rsa-sha2* signatures mentioned.


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: dev-unsubscr...@mina.apache.org

For queries about this service, please contact Infrastructure at:
us...@infra.apache.org


---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscr...@mina.apache.org
For additional commands, e-mail: dev-h...@mina.apache.org

Reply via email to