Red Hat Bugzilla – Bug 1020417
ssh_config manual page lists incorrect default value of KexAlgorithms
Last modified: 2014-02-18 18:57:01 EST
Description of problem: Manual page of ssh_config contains: KexAlgorithms Specifies the available KEX (Key Exchange) algorithms. Multiple algorithms must be comma-separated. The default is “ecdh-sha2-nistp256”, “ecdh-sha2-nistp384”, “ecdh-sha2-nistp521”, “diffie-hellman-group-exchange-sha256”, “diffie-hellman-group-exchange-sha1”, “diffie-hellman-group14-sha1”, “diffie-hellman-group1-sha1”. This is wrong as “ecdh-sha2-nistp256”, “ecdh-sha2-nistp384” and “ecdh-sha2-nistp521” are not implemented by RH's openssh. Version-Release number of selected component (if applicable): openssh-client-5.3p1-93.el6 How reproducible: Always Steps to Reproduce: 1. man ssh_config | grep ecdh-sha2-nistp256 || echo OK Actual results: “ecdh-sha2-nistp256”, “ecdh-sha2-nistp384”, “ecdh-sha2-nistp521”, Expected results: OK Additional info:
Created attachment 813770 [details] fixed ssh_config.5 --- a/ssh_config.5 +++ b/ssh_config.5 @@ -633,9 +633,6 @@ and Specifies the available KEX (Key Exchange) algorithms. Multiple algorithms must be comma-separated. The default is -.Dq ecdh-sha2-nistp256 , -.Dq ecdh-sha2-nistp384 , -.Dq ecdh-sha2-nistp521 , .Dq diffie-hellman-group-exchange-sha256 , .Dq diffie-hellman-group-exchange-sha1 , .Dq diffie-hellman-group14-sha1 ,
This request was not resolved in time for the current release. Red Hat invites you to ask your support representative to propose this request, if still desired, for consideration in the next release of Red Hat Enterprise Linux.
Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. http://rhn.redhat.com/errata/RHBA-2013-1695.html