On Thu, Aug 13, 2015 at 8:33 PM, Mike Frysinger wrote:
> On 13 Aug 2015 17:18, Mike Gilbert wrote:
>> On Wed, Aug 12, 2015 at 11:17 PM, Mike Frysinger wrote:
>> > +If you are stuck with DSA keys, you can re-enable support locally by
>> > +updating your sshd_config file with a line like so:
>> > +
On 13 Aug 2015 17:18, Mike Gilbert wrote:
> On Wed, Aug 12, 2015 at 11:17 PM, Mike Frysinger wrote:
> > +If you are stuck with DSA keys, you can re-enable support locally by
> > +updating your sshd_config file with a line like so:
> > + PubkeyAcceptedKeyTypes=+ssh-dss
>
> I think this shoul
On Wed, Aug 12, 2015 at 11:17 PM, Mike Frysinger wrote:
> ---
> .../2015-08-13-openssh-weak-keys.en.txt| 26
> ++
> 1 file changed, 26 insertions(+)
> create mode 100644
> 2015/2015-08-13-openssh-weak-keys/2015-08-13-openssh-weak-keys.en.txt
>
> diff --git
> a/
On 13 Aug 2015 09:00, Kristian Fiskerstrand wrote:
> On 08/13/2015 05:17 AM, Mike Frysinger wrote:
> > +Your best option is to generate new keys using newer types such as
> > rsa +or ecdsa or ed25519. RSA keys will give you the greatest
> > portability +with other clients/servers while ed25519 wil
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Hi,
might be nitpick, but..
On 08/13/2015 05:17 AM, Mike Frysinger wrote:
> +Your best option is to generate new keys using newer types such as
> rsa +or ecdsa or ed25519. RSA keys will give you the greatest
> portability +with other clients/serv
On Wed, Aug 12, 2015 at 11:17 PM, Mike Frysinger wrote:
> ---
> .../2015-08-13-openssh-weak-keys.en.txt| 26
> ++
> 1 file changed, 26 insertions(+)
> create mode 100644
> 2015/2015-08-13-openssh-weak-keys/2015-08-13-openssh-weak-keys.en.txt
>
> diff --git
> a/
---
.../2015-08-13-openssh-weak-keys.en.txt| 26 ++
1 file changed, 26 insertions(+)
create mode 100644
2015/2015-08-13-openssh-weak-keys/2015-08-13-openssh-weak-keys.en.txt
diff --git
a/2015/2015-08-13-openssh-weak-keys/2015-08-13-openssh-weak-keys.en.txt
b/20