Need to revert behavior of OpenSSH to the old key order ...

Jason Usher jusher71 at yahoo.com
Wed May 23 00:23:40 UTC 2012



--- On Tue, 5/22/12, Ian Lepore <freebsd at damnhippie.dyndns.org> wrote:

> Seeing your example config with the commented-out HostKey
> lines made me
> realize that you probably want to have two HostKey lines,
> one for the
> protocol v1 key and another for the dsa key for v2. 
> The 6.x server
> added the v1 key and the v2 dsa key by default, so you could
> have
> existing clients relying on a v1 key.  Since you now
> have a HostKey
> statement the new server code won't add the v1 key by
> default so you'd
> need to be explicit about it.  
> 
> Based on examining the code, I think this will be safe
> because the keys
> have different type-names ("rsa1" vs "rsa") so a client
> wanting to use a
> protocol v2 rsa key won't accidentally match the protcol v1
> rsa key
> named in the config file (and it will still match the dsa
> key).


Well, yes - and after restarting sshd, this was made clear:

Stopping sshd.
Starting sshd.
Disabling protocol version 1. Could not load host key

However, those commented out HostKey lines were always commented out - I did not comment them out.  In fact, my change was to uncomment the last one.

Further, I think the:

/etc/ssh/ssh_host_key

key, for protocol v1, is an RSA key, right ?  But you are saying it's an older rsa1 key ?

Ok, I will uncomment both lines now, and it will read:

# HostKey for protocol version 1
HostKey /etc/ssh/ssh_host_key
# HostKeys for protocol version 2
HostKey /etc/ssh/ssh_host_dsa_key

I just tried it and it seems to work (no scary key mismatch messages for DSA clients)

Thanks.


More information about the freebsd-hackers mailing list