CVSROOT: /cvs
Module name: src
Changes by: [email protected] 2018/07/03 05:39:54
Modified files:
usr.bin/ssh : PROTOCOL.certkeys auth2-hostbased.c
auth2-pubkey.c authfd.c compat.c compat.h kex.c
kex.h myproposal.h ssh-rsa.c ssh_config.5
sshconnect2.c sshd.c sshd_config.5 ssherr.c
ssherr.h sshkey.c sshkey.h
Log message:
Improve strictness and control over RSA-SHA2 signature types:
In ssh, when an agent fails to return a RSA-SHA2 signature when
requested and falls back to RSA-SHA1 instead, retry the signature to
ensure that the public key algorithm sent in the SSH_MSG_USERAUTH
matches the one in the signature itself.
In sshd, strictly enforce that the public key algorithm sent in the
SSH_MSG_USERAUTH message matches what appears in the signature.
Make the sshd_config PubkeyAcceptedKeyTypes and
HostbasedAcceptedKeyTypes options control accepted signature algorithms
(previously they selected supported key types). This allows these
options to ban RSA-SHA1 in favour of RSA-SHA2.
Add new signature algorithms "[email protected]" and
"[email protected]" to force use of RSA-SHA2 signatures
with certificate keys.
feedback and ok markus@