Bug 1884920
| Summary: | Cannot ssh into CentOS 6 using ssh key authentication | ||
|---|---|---|---|
| Product: | [Fedora] Fedora | Reporter: | Scott Reese <sjreese> |
| Component: | openssh | Assignee: | Jakub Jelen <jjelen> |
| Status: | CLOSED NOTABUG | QA Contact: | Fedora Extras Quality Assurance <extras-qa> |
| Severity: | low | Docs Contact: | |
| Priority: | unspecified | ||
| Version: | 33 | CC: | bfinger, crypto-team, dgsiegel, dwalsh, jjelen, jpazdziora, kecarter, lkundrak, mattias.ellert, neteler, plautrba, tmraz, wijngaarde, work.eric, zawertun |
| Target Milestone: | --- | ||
| Target Release: | --- | ||
| Hardware: | x86_64 | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Fixed In Version: | Doc Type: | If docs needed, set a value | |
| Doc Text: | Story Points: | --- | |
| Clone Of: | Environment: | ||
| Last Closed: | 2020-10-29 15:45:32 UTC | Type: | Bug |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
|
Description
Scott Reese
2020-10-03 15:36:38 UTC
The Fedora 33 removes SHA1, which will certainly be in the release notes [1]. But it did not mention ssh at all yet, but we are going to fix it.
There is a simple workaround by using ECDSA authentication and host keys (which use SHA2 ever since) or creating a following configuration snippet to connect to legacy hosts:
# legacy host not supporting RSA with SHA2
Host server.name.here:
PubkeyAcceptedKeyTypes ssh-rsa
I will keep the bug open until we will make sure the release notes are fixed.
[1] https://fedoraproject.org/wiki/Releases/33/ChangeSet#Strong_crypto_settings:_phase_2
Just to confirm, while running F33 I too had issues when interacting with legacy SSH servers. The noted config is a good work-around for anyone who's needing to interact with existing SSH servers; especially those working in or around an ssh based git workflow (the OpenStack (OpenInfrastructure) community, github, etc).
The following config was added to my user's ssh config `~/.ssh/config`:
Host review.opendev.org
PubkeyAcceptedKeyTypes ssh-rsa
While less than desirable, it works.
Overall, this can likely be marked as a duplicate of bug 1881301. (In reply to Jan Pazdziora from comment #3) > Overall, this can likely be marked as a duplicate of bug 1881301. No, it is not the same. The bug #1881301 is a main issue in Debian, which has newer OpenSSH, but with a bug preventing negotiating the SHA2 methods even though they are properly implemented (the only openssh release that had this problem). The OpenSSH in RHEL6/CentOS6 does not support rsa-sha2 and never will. Not even the patch proposed in bug #1881301 is going to address the issue of connecting to the RHEL6/CentOS 6 servers. The other possible workaround is to use ECDSA keys, which are available in RHEL6/CentOS6 and use SHA2 implicitly. This is expected behavior. You have to switch to the LEGACY crypto policy to communicate with legacy systems. And RHEL-6/CentOS-6 is certainly a legacy system. (In reply to Jakub Jelen from comment #4) > (In reply to Jan Pazdziora from comment #3) > > Overall, this can likely be marked as a duplicate of bug 1881301. > > No, it is not the same. Mea culpa. Thanks for the explanation. |