Description of problem:
curve25519-sha256 is not compatible with DEFAULT profile (and perhaps others)
Version-Release number of selected component (if applicable):
# rpm -q crypto-policies openssh
Steps to Reproduce:
1. ssh -o KexAlgorithms=curve25519-sha256 -o UserKnownHostsFile=/dev/null -o StrictHostKeyChecking=no localhost
Unable to negotiate with ::1 port 22: no matching key exchange method found. Their offer: email@example.com,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group14-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1
This is regression against RHEL-7, so we need to at least document it as known issue. Not a blocker material.
Mirek, can we document it as known issue in RHEL-8.0?
Do we need a separate bug for the documentation?
Verify test runs in CI: https://baseos-jenkins.rhev-ci-vms.eng.rdu2.redhat.com/job/ci-openstack/29584//console
[10.0.132.116 ] T: 5 [-ciphers-in-practice-do-not-meet-the-stated] Running
[10.0.132.116 ] 1562575727 [Setup ] PASS Score: 0
[10.0.132.116 ] 1562575728 [Test-available-ciphers ] PASS Score: 0
[10.0.132.116 ] 1562575729 [Test-available-macs ] PASS Score: 0
[10.0.132.116 ] 1562575730 [KEX-algorithms ] PASS Score: 0
[10.0.132.116 ] 1562575731 [Key-types ] PASS Score: 0
[10.0.132.116 ] 1562575732 [Cleanup ] PASS Score: 0
[10.0.132.116 ] T: 5 [-ciphers-in-practice-do-not-meet-the-stated] Completed: PASS
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.
For information on the advisory, and where to find the updated
files, follow the link below.
If the solution does not work for you, open a new bug report.