Bug 1884920
Summary: | Cannot ssh into CentOS 6 using ssh key authentication | ||
---|---|---|---|
Product: | [Fedora] Fedora | Reporter: | Scott Reese <sjreese> |
Component: | openssh | Assignee: | Jakub Jelen <jjelen> |
Status: | CLOSED NOTABUG | QA Contact: | Fedora Extras Quality Assurance <extras-qa> |
Severity: | low | Docs Contact: | |
Priority: | unspecified | ||
Version: | 33 | CC: | bfinger, crypto-team, dgsiegel, dwalsh, jjelen, jpazdziora, kecarter, lkundrak, mattias.ellert, neteler, plautrba, tmraz, wijngaarde, work.eric, zawertun |
Target Milestone: | --- | ||
Target Release: | --- | ||
Hardware: | x86_64 | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | If docs needed, set a value | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2020-10-29 15:45:32 UTC | Type: | Bug |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
Scott Reese
2020-10-03 15:36:38 UTC
The Fedora 33 removes SHA1, which will certainly be in the release notes [1]. But it did not mention ssh at all yet, but we are going to fix it. There is a simple workaround by using ECDSA authentication and host keys (which use SHA2 ever since) or creating a following configuration snippet to connect to legacy hosts: # legacy host not supporting RSA with SHA2 Host server.name.here: PubkeyAcceptedKeyTypes ssh-rsa I will keep the bug open until we will make sure the release notes are fixed. [1] https://fedoraproject.org/wiki/Releases/33/ChangeSet#Strong_crypto_settings:_phase_2 Just to confirm, while running F33 I too had issues when interacting with legacy SSH servers. The noted config is a good work-around for anyone who's needing to interact with existing SSH servers; especially those working in or around an ssh based git workflow (the OpenStack (OpenInfrastructure) community, github, etc). The following config was added to my user's ssh config `~/.ssh/config`: Host review.opendev.org PubkeyAcceptedKeyTypes ssh-rsa While less than desirable, it works. Overall, this can likely be marked as a duplicate of bug 1881301. (In reply to Jan Pazdziora from comment #3) > Overall, this can likely be marked as a duplicate of bug 1881301. No, it is not the same. The bug #1881301 is a main issue in Debian, which has newer OpenSSH, but with a bug preventing negotiating the SHA2 methods even though they are properly implemented (the only openssh release that had this problem). The OpenSSH in RHEL6/CentOS6 does not support rsa-sha2 and never will. Not even the patch proposed in bug #1881301 is going to address the issue of connecting to the RHEL6/CentOS 6 servers. The other possible workaround is to use ECDSA keys, which are available in RHEL6/CentOS6 and use SHA2 implicitly. This is expected behavior. You have to switch to the LEGACY crypto policy to communicate with legacy systems. And RHEL-6/CentOS-6 is certainly a legacy system. (In reply to Jakub Jelen from comment #4) > (In reply to Jan Pazdziora from comment #3) > > Overall, this can likely be marked as a duplicate of bug 1881301. > > No, it is not the same. Mea culpa. Thanks for the explanation. |