Re: [arch-dev-public] News item for openssh-7.0p1-1
[2015-08-12 20:24:07 +0200] Jens Adam:
Thu, 13 Aug 2015 00:03:59 +0900 Gaetan Bisson <bisson@archlinux.org>:
Hi,
I'd like to suggest the following piece of news to be posted when openssh-7.0p1-1 lands in [core]:
The new openssh-7.0p1 release deprecates certain types of SSH keys that are now considered vulnerable. For details, see the [upstream announcement](http://lists.mindrot.org/pipermail/openssh-unix-announce/2015-August/000122....).
Before updating and restarting sshd on remote hosts, if you rely on SSH keys for authentication, please make sure that you have a recent key pair set up, or alternative means of logging in (such as using password authentication).
Perhaps you could clarify that this only affects people using ssh-dss keys for authentication and how to check for them, e.g. "use 'grep ssh-dss ~/.ssh/{known_hosts,authorized_keys*,*.pub}' to find legacy keys".
Oh, sure. Here's a new proposal: The new `openssh-7.0p1` release deprecates keys of `ssh-dss` type (also known as DSA) in light of recently discovered vulnerabilities. For details, see the [upstream announcement](http://lists.mindrot.org/pipermail/openssh-unix-announce/2015-August/000122....). Before updating and restarting sshd on remote hosts, make sure you do not rely solely on DSA keys for connecting to it. You may enumerate DSA keys that allow connecting to a remote account with: grep ssh-dss ~/.ssh/authorized_keys If you have any, ensure you have alternative means of logging in (such a key pair of a different type, or password authentication). Note that host keys of `ssh-dss` type are also deprecated; if you were relying on them to connect to a server, after updating it, you will have to confirm the fingerprint of a key of another type to reconnect. -- Gaetan
[2015-08-13 12:34:07 +0900] Gaetan Bisson:
Oh, sure. Here's a new proposal:
Better wording. Title: openssh-7.0p1 deprecates ssh-dss keys In light of recently discovered vulnerabilities, the new `openssh-7.0p1` release deprecates keys of `ssh-dss` type, also known as DSA keys. See the [upstream announcement](http://lists.mindrot.org/pipermail/openssh-unix-announce/2015-August/000122....) for details. Before updating and restarting `sshd` on a remote host, make sure you do not rely on such keys for connecting to it. To enumerate DSA keys granting access to a given account, use: grep ssh-dss ~/.ssh/authorized_keys If you have any, ensure you have alternative means of logging in, such as key pairs of a different type, or password authentication. Finally, host keys of `ssh-dss` type being deprecated too, you might have to confirm a new fingerprint (for a host key of a different type) when connecting to a freshly updated server. -- Gaetan
participants (1)
-
Gaetan Bisson