PSA: Your ssh-rsa keys are NOT BEING DEPRECATED in ssh. ssh-rsa keys can, under the hood, be used with SHA-1 signatures or SHA-256 signatures. You don't need to regenerate your keys. No need to panic.
-
Show this thread
-
OpenSSH's advisory was worded very confusingly, but the way it works is that ssh-rsa *keys* can be used with both the ssh-rsa *algorithm* and the rsa-sha2-256 *algorithm*. If both sides support the latter then there is no SHA1 in use.
2 replies 6 retweets 40 likesShow this thread -
This also applies to hardware tokens, e.g. YubiKeys. The token doesn't know nor care how its ssh-rsa support is being used. It works fine. Use `ssh -vvv` to check for rsa-sha2-512 or rsa-sha2-256.
1 reply 2 retweets 27 likesShow this thread -
Replying to @marcan42
That said, if you're reconfiguring servers and clients anyway, wouldn't it be a good excuse to migrate to ssh-ed25519? I've started pushing out this cipher suite config to most of my boxes: https://www.antikernel.net/temp/sshd_config …
4 replies 0 retweets 2 likes
I migrated to ed25519 for authentication, then started using hardware tokens and migrated back to RSA.
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.