NetBSD-Bugs archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

Re: bin/50148: new ssh does not work at all



On Aug 14,  6:55am, martin%NetBSD.org@localhost wrote:
}
} >Number:         50148
} >Synopsis:       new ssh does not work at all
} >Severity:       critical
} >Priority:       high
} >Responsible:    bin-bug-people
} >State:          open
} >Class:          sw-bug
} >Arrival-Date:   Fri Aug 14 06:55:00 +0000 2015
} >Originator:     Martin Husemann
} >Release:        NetBSD 7.99.20
} >Description:
} 
} Since updating to the new ssh yesterday, I can't connect anywhere:
} 
} [snip]
} 
} debug1: Authentications that can continue: publickey
} debug3: start over, passed a different list publickey
} debug3: preferred kerberos-2%ssh.com@localhost,publickey,keyboard-interactive,password
} debug3: authmethod_lookup publickey
} debug3: remaining preferred: keyboard-interactive,password
} debug3: authmethod_is_enabled publickey
} debug1: Next authentication method: publickey
} debug1: Skipping ssh-dss key /home/martin/.ssh/id_dsa for not in PubkeyAcceptedKeyTypes

     I think the issue is here.  Reading the release announcement,
I see that they have been disabling/deprecating all sorts of things,
in the name of improving security (and intend to do more of this
in the next release).  Apparently, they don't think backwards
compatibility is important.

>From the announcment:

-----

[...]
Changes since OpenSSH 6.9
=========================

This focus of this release is primarily to deprecate weak, legacy
and/or unsafe cryptography.
[...]
Potentially-incompatible Changes
--------------------------------

 * Support for the legacy SSH version 1 protocol is disabled by
   default at compile time.

 * Support for the 1024-bit diffie-hellman-group1-sha1 key exchange
   is disabled by default at run-time. It may be re-enabled using
   the instructions at http://www.openssh.com/legacy.html

 * Support for ssh-dss, ssh-dss-cert-* host and user keys is disabled
   by default at run-time. These may be re-enabled using the
   instructions at http://www.openssh.com/legacy.html

 * Support for the legacy v00 cert format has been removed.

 * The default for the sshd_config(5) PermitRootLogin option has
   changed from "yes" to "prohibit-password".

 * PermitRootLogin=without-password/prohibit-password now bans all
   interactive authentication methods, allowing only public-key,
   hostbased and GSSAPI authentication (previously it permitted
   keyboard-interactive and password-less authentication if those
   were enabled).

-----

martin's issue is the third point.

     On a slightly different, but similar issue, I sure hope we
have reversed the first point (SSHv1 being disabled at compile
time).  I still use SSHv1 for connecting to older, but perfectly
functional routers.  What do they expect me to do, switch to using
telnet, which would be the only alternative.  "Replace the routers"
is not a good answer.

} debug1: Trying private key: /home/martin/.ssh/id_rsa
} debug3: no such identity: /home/martin/.ssh/id_rsa: No such file or directory
} debug1: Trying private key: /home/martin/.ssh/id_ecdsa
} debug3: no such identity: /home/martin/.ssh/id_ecdsa: No such file or directory
} debug1: Trying private key: /home/martin/.ssh/id_ed25519
} debug3: no such identity: /home/martin/.ssh/id_ed25519: No such file or directory
} debug2: we did not send a packet, disable method
} debug1: No more authentication methods to try.
} Permission denied (publickey).
} 
}-- End of excerpt from martin%NetBSD.org@localhost


Home | Main Index | Thread Index | Old Index