Re: ssh-keygen and rsa Keys

2016-09-26 Thread Lars Noodén
On 09/27/2016 12:19 AM, Martin McCormick wrote:
>...
>   The short story is that the Mac now uses openssh-7
> instead of open-ssh-6. Dsa encryption keys have been declared
> obsolete for some time now and openssh-7 defaults to ignoring
> any id_dsa.pub keys you might have been using.
>...

That brings up two things to my mind.

First is with client authentication that one should start planning ahead
for elliptical curve cryptography :

https://www.gnupg.org/faq/gnupg-faq.html#please_use_ecc

Ed25519 seems to be the way forward there, for now.

Second, the server identification keys ought to be addressed too, so
that DSA is also turned off there.  The servers are targets for MitM
attacks if they leave up the option for host identification via DSA
keys.  Turning off DSA requires a bit of planning if there are many
accounts using the server.

Regards,
Lars



ssh-keygen and rsa Keys

2016-09-26 Thread Martin McCormick
After upgrading a Mac to sierra which is their newest
version of macosx, I discovered that I could no longer ssh
without a password in either direction from the Mac to a debian
system or vice versa. I first thought the system key had changed
but it hadn't.

The short story is that the Mac now uses openssh-7
instead of open-ssh-6. Dsa encryption keys have been declared
obsolete for some time now and openssh-7 defaults to ignoring
any id_dsa.pub keys you might have been using.

The sky is not falling, however. All you have to do to
make things start working as before is generate new rsa keys all
around.

The procedure is identical to the dsa key procedure and
you get a public and private key pair, one of which is id_rsa.pub
which you install in the authorized_keys file on the remote
system and life is beautiful again.

Actually, rsa keys have been in use since the late
seventies but they were encumbered by patent restrictions so the
dsa key came about in the nineties with no licensing issues for
key generating software so open-source and other systems began
using dsa keys.

The information I have read while doing research to solve
the problem basically says that dsa and rsa keys perform about as
well with each having slight advantages. Rsa keys can be made for
different lengths and default to 2048 bits making them harder to
crack via brute force. the  patents expired some time ago so as
more systems go to openssh-7, you will find more systems that
won't like your old dsa keys.

This is not really an Apple or a Debian issue so as time
goes by, there will be more times when a rsa key is needed.

I am running debian wheezy plus I have a very old Linux
installation dating back to 2009 and all systems are perfectly
happy using rsa keys now.

The only thing I noticed was that the old debian system
took several seconds to generate the new rsa key. The  wheezy
system generated a rsa key as fast as I could buzz through the
two input fields for a password  which I didn't need this time.

Martin