NetBSD-Bugs archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
Re: bin/50148: new ssh does not work at all
On Aug 14, 6:55am, martin%NetBSD.org@localhost wrote:
}
} >Number: 50148
} >Synopsis: new ssh does not work at all
} >Severity: critical
} >Priority: high
} >Responsible: bin-bug-people
} >State: open
} >Class: sw-bug
} >Arrival-Date: Fri Aug 14 06:55:00 +0000 2015
} >Originator: Martin Husemann
} >Release: NetBSD 7.99.20
} >Description:
}
} Since updating to the new ssh yesterday, I can't connect anywhere:
}
} [snip]
}
} debug1: Authentications that can continue: publickey
} debug3: start over, passed a different list publickey
} debug3: preferred kerberos-2%ssh.com@localhost,publickey,keyboard-interactive,password
} debug3: authmethod_lookup publickey
} debug3: remaining preferred: keyboard-interactive,password
} debug3: authmethod_is_enabled publickey
} debug1: Next authentication method: publickey
} debug1: Skipping ssh-dss key /home/martin/.ssh/id_dsa for not in PubkeyAcceptedKeyTypes
I think the issue is here. Reading the release announcement,
I see that they have been disabling/deprecating all sorts of things,
in the name of improving security (and intend to do more of this
in the next release). Apparently, they don't think backwards
compatibility is important.
>From the announcment:
-----
[...]
Changes since OpenSSH 6.9
=========================
This focus of this release is primarily to deprecate weak, legacy
and/or unsafe cryptography.
[...]
Potentially-incompatible Changes
--------------------------------
* Support for the legacy SSH version 1 protocol is disabled by
default at compile time.
* Support for the 1024-bit diffie-hellman-group1-sha1 key exchange
is disabled by default at run-time. It may be re-enabled using
the instructions at http://www.openssh.com/legacy.html
* Support for ssh-dss, ssh-dss-cert-* host and user keys is disabled
by default at run-time. These may be re-enabled using the
instructions at http://www.openssh.com/legacy.html
* Support for the legacy v00 cert format has been removed.
* The default for the sshd_config(5) PermitRootLogin option has
changed from "yes" to "prohibit-password".
* PermitRootLogin=without-password/prohibit-password now bans all
interactive authentication methods, allowing only public-key,
hostbased and GSSAPI authentication (previously it permitted
keyboard-interactive and password-less authentication if those
were enabled).
-----
martin's issue is the third point.
On a slightly different, but similar issue, I sure hope we
have reversed the first point (SSHv1 being disabled at compile
time). I still use SSHv1 for connecting to older, but perfectly
functional routers. What do they expect me to do, switch to using
telnet, which would be the only alternative. "Replace the routers"
is not a good answer.
} debug1: Trying private key: /home/martin/.ssh/id_rsa
} debug3: no such identity: /home/martin/.ssh/id_rsa: No such file or directory
} debug1: Trying private key: /home/martin/.ssh/id_ecdsa
} debug3: no such identity: /home/martin/.ssh/id_ecdsa: No such file or directory
} debug1: Trying private key: /home/martin/.ssh/id_ed25519
} debug3: no such identity: /home/martin/.ssh/id_ed25519: No such file or directory
} debug2: we did not send a packet, disable method
} debug1: No more authentication methods to try.
} Permission denied (publickey).
}
}-- End of excerpt from martin%NetBSD.org@localhost
Home |
Main Index |
Thread Index |
Old Index