Launchpad has imported 8 comments from the remote bug at https://bugzilla.redhat.com/show_bug.cgi?id=1623929.
If you reply to an imported comment from within Launchpad, your comment will be sent to the remote bug automatically. Read more about Launchpad's inter-bugtracker facilities at https://help.launchpad.net/InterBugTracking. ------------------------------------------------------------------------ On 2018-08-30T13:22:47+00:00 Jakub wrote: Description of problem: The OpenSSH server in RHEL7.6 does not send complete list of signature algorithms in SHA2 extension. debug1: kex_input_ext_info: server-sig-algs=<rsa-sha2-256,rsa-sha2-512> This causes failures if the client is on OpenSSH 7.8p1+ (Fedora 28+) and for some reason disabled the rsa-sha2-* public key algorithms with PubkeyAcceptedKeyTypes configuration option. The correct list should look like this: debug1: kex_input_ext_info: server-sig-algs=<ssh-ed25519,ssh-rsa,rsa- sha2-256,rsa-sha2-512,ssh-dss,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384 ,ecdsa-sha2-nistp521,null> This does not affect any other key types at this moment. Version-Release number of selected component (if applicable): openssh-7.4p1-16 How reproducible: specific configuration Steps to Reproduce: 1. Install OpenSSH 7.8p1 (Fedora 28+) 2. Configure pubkey authentication using RSA key with remote server example.com 3. ssh -vvv -o PubkeyAcceptedKeyTypes=ssh-rsa example.com Actual results: debug1: Next authentication method: publickey debug1: Offering public key: RSA SHA256:I1XXiJ/wkXC6Vn8ohZVHcJTCCKoPKm4mL8qtjtyNMhw /home/lslebodn/.ssh/id_rsa debug1: send_pubkey_test: no mutual signature algorithm Expected results: The authentication should proceed using ssh-rsa algorithm. Additional info: This is a change in OpenSSH 7.8 that it is getting more strict about handling this extension. Unfortunately we carry broken version in RHEL7, which is not sending complete list of algorithms. Workaround: In client, list also the SHA2 extension algorithms: PubkeyAcceptedKeyTypes rsa-sha2-256,rsa-sha2-512 If you need to adjust this list, rather use the + sign. Thanks lslebodn for reporting this issue to me. Reply at: https://bugs.launchpad.net/ubuntu/+source/openssh/+bug/1790963/comments/0 ------------------------------------------------------------------------ On 2018-09-04T16:46:16+00:00 Christoph wrote: Hi, client fedora 28 with openssh-7.8p1-2.fc28.x86_64 using a ssh-rsa-cert-...@openssh.com client certificate > debug1: Offering public key: RSA-CERT > SHA256:xxx > /home/c/.ssh/id_rsa-cert.pub > debug1: send_pubkey_test: no mutual signature algorithm The proposed workaround does not seem to work (Even if adding the cert type) > PubkeyAcceptedKeyTypes rsa-sha2-256,rsa-sha2-512,ssh-rsa,ssh-rsa- cert-...@openssh.com Reply at: https://bugs.launchpad.net/ubuntu/+source/openssh/+bug/1790963/comments/1 ------------------------------------------------------------------------ On 2018-09-04T17:33:06+00:00 Jakub wrote: If you want to use certificates, you need to list also the SHA2 variants of certificates: rsa-sha2-256-cert-...@openssh.com,rsa-sha2-512-cert-...@openssh.com Not sure if this is somewhere documented, but is should do the job. Reply at: https://bugs.launchpad.net/ubuntu/+source/openssh/+bug/1790963/comments/2 ------------------------------------------------------------------------ On 2018-09-05T11:07:44+00:00 Christoph wrote: Hi, i tried PubkeyAcceptedKeyTypes rsa-sha2-256,rsa-sha2-512,rsa- sha2-256-cert-...@openssh.com,rsa-sha2-512-cert-...@openssh.com,ssh-rsa- cert-...@openssh.com but still debug1: send_pubkey_test: no mutual signature algorithm Reply at: https://bugs.launchpad.net/ubuntu/+source/openssh/+bug/1790963/comments/3 ------------------------------------------------------------------------ On 2018-09-05T11:36:43+00:00 Jakub wrote: Please, open a customer case if you have this issue with your RHEL installation. https://access.redhat.com/ This will really need a fix in RHEL7 since the new OpenSSH checks the signature algorithms against the hardcoded list there, which is wrong. Reply at: https://bugs.launchpad.net/ubuntu/+source/openssh/+bug/1790963/comments/4 ------------------------------------------------------------------------ On 2018-09-06T17:21:31+00:00 Etienne wrote: Hi all, Even if the CA is an RSA key, you can sign ECDSA or ED25519 keys so you get ECDSA/ED25519 certs which allow you to work around the issue without changing anything server-side Exemple cert: $ ssh-keygen -Lf ~/.ssh/id_ed25519-cert.pub ~/.ssh/id_ed25519-cert.pub: Type: ssh-ed25519-cert-...@openssh.com user certificate Public key: ED25519-CERT SHA256:<...> Signing CA: RSA SHA256:<...> Key ID: "..." Reply at: https://bugs.launchpad.net/ubuntu/+source/openssh/+bug/1790963/comments/8 ------------------------------------------------------------------------ On 2018-10-31T12:17:01+00:00 Christoph wrote: I think something happend within openssh 7.9 if my interpretation of this is correct: https://www.spinics.net/lists/openssh-unix- dev/msg05371.html Reply at: https://bugs.launchpad.net/ubuntu/+source/openssh/+bug/1790963/comments/12 ------------------------------------------------------------------------ On 2018-10-31T12:55:48+00:00 Jakub wrote: Indeed, there is fix [1] in latest OpenSSH 7.9p1 so updating the clients to the latest version should resolve the issue. But it does not change that there is a bug in RHEL7 too. [1] https://github.com/openssh/openssh-portable/commit/1a4a9cf8 Reply at: https://bugs.launchpad.net/ubuntu/+source/openssh/+bug/1790963/comments/13 ** Changed in: openssh (Fedora) Status: Unknown => Confirmed ** Changed in: openssh (Fedora) Importance: Unknown => Undecided -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1790963 Title: Unable to connect with openssh 7.8 client and certificates To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/openssh/+bug/1790963/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs