Indeed. PuTTY 0.62 and earlier had a habit of generating slightly short
keys sometimes.
This is unlikely to change in OpenSSH - the minimum key size is only
likely to increase over time. I'd strongly suggest just generating a
2048-bit key, since SSH keys are usually pretty easy to roll over.
**
AFAIK build time:
sshkey.h:49:#define SSH_RSA_MINIMUM_MODULUS_SIZE1024
And those short keys are really considered insecure, which is the reason
they went from deprecated to no more accepted.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages,
On ubuntu 14.04
ssh-keygen -lf .ssh/authorized_keys
1023 b7:e5:8e:4e:13:84:c2:9a:c8:64:e5:01:e8:84:fc:87 palo@winpgnotas (RSA)
On ubuntu 18.04
ssh-keygen -lf .ssh/authorized_keys
.ssh/authorized_keys is not a public key file.
In Puttygen:
ssh-rsa 1023 b7:e5:8e:4e:13:84:c2:9a:c8:64:e5:01:e8:84:fc
Is our SSH ley length <1024 bit? Such short keys are refused by openssh
7.6.
When you open your key with Puttygen the length is shown in the
beginning of the "Key fingerprint" field. On Ubuntu you can check it
with "ssh-keygen -lf .ssh/authorized_keys".
--
You received this bug notification beca
Status changed to 'Confirmed' because the bug affects multiple users.
** Changed in: openssh (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssh in Ubuntu.
https://bugs.launchpad.n
5 matches
Mail list logo