DEV Community

Cover image for Why OpenSSH 8.8 cannot find a host key type if ssh-rsa is provided
Axel Navarro for Cloud(x);

Posted on • Edited on

Why OpenSSH 8.8 cannot find a host key type if ssh-rsa is provided

The OpenSSH 8.8 is now in the stable channel of Arch Linux and could reach other distributions any time soon.

In the release 8.7, the OpenSSH team announced that the ssh-rsa signature scheme will be disabled by default in the next version: 8.8.

Why?

The ssh-rsa signature scheme uses SHA-1 and it's sensible to chosen-prefix attacks.

What should I do?

This should not be a problem unless you are connecting to a server using the weak ssh-rsa public key algorithm for host authentication.

πŸ’‘ If you're using the version 8.7 or a previous one, you can test your remote hosts like a GitLab or a cloud server using:

ssh -oHostKeyAlgorithms=-ssh-rsa user@host
Enter fullscreen mode Exit fullscreen mode

If the connection fails, that means that the signature algorithm is not compatible with the default configuration of OpenSSH 8.8.

Enabling the weak signature

If you can't upgrade the signature algorithm on your remote servers but you still need to use them, you can use the following command:

ssh -oHostKeyAlgorithms=+ssh-rsa user@host
Enter fullscreen mode Exit fullscreen mode

Using the weak signature with Git

Right now, Bitbucket uses this weak signature algorithm, I guess you need to use your Git repositories hosted there. πŸ₯Ί You can check your connection with the following command:

ssh -oHostKeyAlgorithms=+ssh-rsa git@bitbucket.org
Enter fullscreen mode Exit fullscreen mode

How can we enable this flag for all the Git commands? An easy solution is coming... You can create an SSH configuration file with the following content:

Host bitbucket.org
     HostKeyAlgorithms +ssh-rsa
     IdentitiesOnly yes
Enter fullscreen mode Exit fullscreen mode

The default location of this file is under ~/.ssh/config, maybe you already have one. Once you add this configuration value you can use any git command without restrictions.

That's all

I hope this will help you to still SSHing the world πŸ—ΊοΈ

Top comments (2)

Collapse
 
chadbaldwin profile image
Chad Baldwin

Great writeup! This helped clear some things up.

How do you upgrade the signature algorithm? Is that something that requires upgrading software? Or is it a matter of regenerating your public/private key with a new algorithm?

Collapse
 
navarroaxel profile image
Axel Navarro

The best option is upgrade OpenSSH in the server.

If you can't upgrade the server, you can create new keys using ed25519, or ecdsa.

ssh-keygen -t ecdsa -a 64 -b 384
Enter fullscreen mode Exit fullscreen mode