From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mp2.migadu.com ([2001:41d0:303:e16b::]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)) by ms13.migadu.com with LMTPS id UH6WHQbjcWbYngAAe85BDQ:P1 (envelope-from ) for ; Tue, 18 Jun 2024 19:41:58 +0000 Received: from aspmx1.migadu.com ([2001:41d0:303:e16b::]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)) by mp2.migadu.com with LMTPS id UH6WHQbjcWbYngAAe85BDQ (envelope-from ) for ; Tue, 18 Jun 2024 21:41:58 +0200 X-Envelope-To: larch@yhetil.org Authentication-Results: aspmx1.migadu.com; dkim=fail ("headers rsa verify failed") header.d=gmail.com header.s=20230601 header.b=G7sF+QvK; spf=pass (aspmx1.migadu.com: domain of "bug-guix-bounces+larch=yhetil.org@gnu.org" designates 209.51.188.17 as permitted sender) smtp.mailfrom="bug-guix-bounces+larch=yhetil.org@gnu.org"; dmarc=fail reason="SPF not aligned (relaxed)" header.from=gmail.com (policy=none) ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=yhetil.org; s=key1; t=1718739041; h=from:from:sender:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:mime-version:mime-version: content-type:content-type:resent-cc:resent-from:resent-sender: resent-message-id:in-reply-to:in-reply-to:references:references: list-id:list-help:list-unsubscribe:list-subscribe:list-post: dkim-signature; bh=jj/GudQm4y/OfKEv4i9VZWOVh0HvjBeP/K/31N1iUc0=; b=ggXWGclBAIyWhnooEVr5C+DYxmWV5V+YQMJmkQbdLwE8yMQ/ZhjZk7mXP0O7lCRUKPuYdD 86tK31t7SI9QN/F0hcq7dzMRZWzeGhnXiLt+1s5baN9SK04W6wUDWLY/dDKq9aPUWwYWC9 0AIm80tepdyO0iL9pUlYNMfDa+kDJIsnvbi8ad+WK4vzm+zLHvA1C4mcfsVO0qegFeAn5D q+W2sYE6mrm8TU6j+hG0jJH7R0/trVXwOwV4UWbaUCUQyRPw4GUINmnYD2889LXkcJU0Lw koGfTGvlO4UvFR7ITxDzwugEphgTxINPDHEMFiNxjVnVz6lbH2030R2u5Ty7Rg== ARC-Authentication-Results: i=1; aspmx1.migadu.com; dkim=fail ("headers rsa verify failed") header.d=gmail.com header.s=20230601 header.b=G7sF+QvK; spf=pass (aspmx1.migadu.com: domain of "bug-guix-bounces+larch=yhetil.org@gnu.org" designates 209.51.188.17 as permitted sender) smtp.mailfrom="bug-guix-bounces+larch=yhetil.org@gnu.org"; dmarc=fail reason="SPF not aligned (relaxed)" header.from=gmail.com (policy=none) ARC-Seal: i=1; s=key1; d=yhetil.org; t=1718739041; a=rsa-sha256; cv=none; b=DmL+wdMqX1AOQOM6fni5E2ePOY2s63dUn9NcIpuijNa84uwUdnCRZuyig6w8GnfOzTsZ6I 9t6ytq7IyhdXAQl0CKQ6NL80XD8ywJTr5tD8rbL72HnwwNVkdJjvGfhefIGcBgXznb41hm lCiUdI0EECT41ROQ6M5UDOsQlKjOIfa3SCoU0q5wbHVo9QxX+RV+3WHHU/ex+wAMH1ueiW 3rtphKakKK1C3ZbnfvHYyw+gCbInaef5gSTqnXV44lpNAI1tOcStG9mSNttXIg3Gc+Lzqv t/8F0tGRtjrog821EK2fKoMXg1sJEEQq0uqk+HoR0Livhvjbq8uRwjh4zoH1ng== Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by aspmx1.migadu.com (Postfix) with ESMTPS id 5AEDE3D748 for ; Tue, 18 Jun 2024 21:30:40 +0200 (CEST) Received: from localhost ([::1] helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1sJeWn-0006wO-Si; Tue, 18 Jun 2024 15:30:01 -0400 Received: from eggs.gnu.org ([2001:470:142:3::10]) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1sJeWm-0006vh-AX for bug-guix@gnu.org; Tue, 18 Jun 2024 15:30:00 -0400 Received: from debbugs.gnu.org ([2001:470:142:5::43]) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.90_1) (envelope-from ) id 1sJeWl-0000DH-W7 for bug-guix@gnu.org; Tue, 18 Jun 2024 15:30:00 -0400 Received: from Debian-debbugs by debbugs.gnu.org with local (Exim 4.84_2) (envelope-from ) id 1sJeWo-0005zO-8J for bug-guix@gnu.org; Tue, 18 Jun 2024 15:30:02 -0400 X-Loop: help-debbugs@gnu.org Subject: bug#44887: openssh service creates DSA keys References: In-Reply-To: Resent-From: Vincent Legoll Original-Sender: "Debbugs-submit" Resent-CC: bug-guix@gnu.org Resent-Date: Tue, 18 Jun 2024 19:30:02 +0000 Resent-Message-ID: Resent-Sender: help-debbugs@gnu.org X-GNU-PR-Message: followup 44887 X-GNU-PR-Package: guix X-GNU-PR-Keywords: security To: Efraim Flashner , Ludovic =?UTF-8?Q?Court=C3=A8s?= , 44887@debbugs.gnu.org Received: via spool by 44887-submit@debbugs.gnu.org id=B44887.171873899822986 (code B ref 44887); Tue, 18 Jun 2024 19:30:02 +0000 Received: (at 44887) by debbugs.gnu.org; 18 Jun 2024 19:29:58 +0000 Received: from localhost ([127.0.0.1]:49478 helo=debbugs.gnu.org) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1sJeWj-0005yf-LS for submit@debbugs.gnu.org; Tue, 18 Jun 2024 15:29:58 -0400 Received: from mail-pj1-f50.google.com ([209.85.216.50]:54424) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1sJeWh-0005yI-ET for 44887@debbugs.gnu.org; Tue, 18 Jun 2024 15:29:56 -0400 Received: by mail-pj1-f50.google.com with SMTP id 98e67ed59e1d1-2c3274d5cc7so4949848a91.0 for <44887@debbugs.gnu.org>; Tue, 18 Jun 2024 12:29:52 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1718738927; x=1719343727; darn=debbugs.gnu.org; h=to:subject:message-id:date:from:mime-version:from:to:cc:subject :date:message-id:reply-to; bh=jj/GudQm4y/OfKEv4i9VZWOVh0HvjBeP/K/31N1iUc0=; b=G7sF+QvKRw/bvaSgUVpmZKyxnk2dS8bdgvdO6j1ZZNp4rHTcy9kqSP+GtZlRf+R0Ky RrfzDY59iYvqCNpC2N+17PPGQnhhCudXiCVO0CXktuUZo8moJHIboCRgLopt44IcLkUk BSpjMjGG60aWyRFgTWQPBtnEXockVduvTk4fV2PedY9UoiZ8uEIkDP5h48ZK7jiXDHDG MOmJfBryQ89xuGzEeP7mRNEe21mNo0F0qliH9Psfa46mEaTGG+I/2RRy/wjngjhDGsgV Hlqsn3Cln0oi0bNdMHiFZT0g/q7ZAxSmbMgtV1TAGllITpSjt3D8s9cR/pUN2gB3Wyd2 eNVA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1718738927; x=1719343727; h=to:subject:message-id:date:from:mime-version:x-gm-message-state :from:to:cc:subject:date:message-id:reply-to; bh=jj/GudQm4y/OfKEv4i9VZWOVh0HvjBeP/K/31N1iUc0=; b=NWS9kiFwz1X54KlfBAxELne0iVrS0+P4VHZc5gdZH6ddQrOz80q5WMl2SzAIjpEKgH sP18dcfxXojyuVZfjS0RK1Q1gOLB3KZkXx+PaN+IkxxlpfaE8XCtli7RFQ9SJrRmmJnd HlStHkqW4/8TTUIJytifUrXtV+rN7/NPTQRP8b4KzBAam4t9jVvdPOzU2fkzht3sw7Z2 fg66bMZjPBoZfMNLWbhxErCzBQ0ePamlHyR2LxpKDSjrbW8My0DhI3p1ge2hlB3/8rb2 aW2B+vmdDb+Bc2CgzqxFOSnRKfqTopQEA62+86k+ROCVBGlMeyN0qpc04wG/DXXX9UkZ x3aw== X-Forwarded-Encrypted: i=1; AJvYcCWz3PNfYDhY2VbBNmJTfwq+YrQhzWW98/zJSmcSKP2ZbqY4AskrLQhzDk+ebEHQJOvDBDYCDsDRboiFsI2ySgDhZV9GtKU= X-Gm-Message-State: AOJu0YyxIte9m8pI7dW0QVknP7Iz5muVu+4OTj79aZQtMqUB4U5CH46O e7LEoeDN0zsm1szFQOwHcMX9ZXkwQy15H9kH0b5xf6MVjGWsTD42Sm7avsV60APbYCYgj9Obn0W uU+Rz+XoErWCzMRV2Cl7rkHL6TpU= X-Google-Smtp-Source: AGHT+IFhLH1jst6hgr2s7f4Wd3SdINEkgMdZ1UNXVPaZ14nScb1o5XpKDaAVolm8j0/5gqyxv+ZTGRkmPAhuzbTPp1k= X-Received: by 2002:a17:90a:8c4:b0:2c2:c96c:5390 with SMTP id 98e67ed59e1d1-2c7b57f3fa8mr725113a91.1.1718738926766; Tue, 18 Jun 2024 12:28:46 -0700 (PDT) MIME-Version: 1.0 From: Vincent Legoll Date: Tue, 18 Jun 2024 19:28:35 +0000 Message-ID: Content-Type: text/plain; charset="UTF-8" X-BeenThere: debbugs-submit@debbugs.gnu.org X-Mailman-Version: 2.1.18 Precedence: list X-BeenThere: bug-guix@gnu.org List-Id: Bug reports for GNU Guix List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: bug-guix-bounces+larch=yhetil.org@gnu.org Sender: bug-guix-bounces+larch=yhetil.org@gnu.org X-Migadu-Country: US X-Migadu-Flow: FLOW_IN X-Migadu-Queue-Id: 5AEDE3D748 X-Migadu-Scanner: mx13.migadu.com X-Migadu-Spam-Score: -5.26 X-Spam-Score: -5.26 X-TUID: paB8noVSaWTo Hello, I've done some digging on that issue. Hope it'll help. It looks like the clients still support the DSA keys. This is on a Void linux desktop: [vince@destop ~]$ ssh -Q PubkeyAcceptedAlgorithms | grep -i dss ssh-dss ssh-dss-cert-v01@openssh.com The following Guix VM has been created 2 days ago, with a very light config vince@guix ~$ ssh -Q PubkeyAcceptedAlgorithms | grep -i ssh-dss ssh-dss ssh-dss-cert-v01@openssh.com So, I created a DSA PKI key pair, like so: ssh-keygen -N '' -t dsa -f ssh-key-dsa Uploaded the public key to the guix VM, as ~vince/.ssh/authorized_keys then tried to connect to the OpenSSH server on that VM [vince@desktop ~]$ ssh -vi ssh-key-dsa vince@10.0.0.101 OpenSSH_9.7p1, OpenSSL 3.3.0 9 Apr 2024 debug1: Reading configuration data /home/vince/.ssh/config debug1: /home/vince/.ssh/config line 1: Applying options for * debug1: Reading configuration data /etc/ssh/ssh_config debug1: Connecting to 10.0.0.101 [10.0.0.101] port 22. debug1: Connection established. debug1: identity file ssh-key-dsa type 1 [...] debug1: Skipping ssh-dss key ssh-key-dsa - corresponding algorithm not in PubkeyAcceptedAlgorithms debug1: No more authentication methods to try. vince@10.0.0.101: Permission denied (publickey). So it looks like DSA client keys are not accepted any more by default. Is there a problem for the server host key ? vince@guix ~$ ls /etc/ssh/ authorized_keys.d/ ssh_host_ed25519_key ssh_host_rsa_key.pub ssh_host_ecdsa_key ssh_host_ed25519_key.pub ssh_host_ecdsa_key.pub ssh_host_rsa_key No DSA keys here. Maybe something has been changed and they are not created any more. So I'm not sure there is a problem, or am I mistaken ? Didn't I look hard enough ? WDYT ? Announce of DSA support removal from OpenSSH: https://lists.mindrot.org/pipermail/openssh-unix-dev/2024-January/041132.html Some context about DSA keys: https://security.stackexchange.com/questions/112802/why-openssh-deprecated-dsa-keys -- Vincent Legoll