On Thu, Mar 12, 2015 at 04:20:47PM +0000, Christian Weisgerber wrote:
> On 2015-03-12, John Long <codeb...@inbox.lv> wrote:
> 
> >> You can simply configure HostKey in /etc/ssh/sshd_config.
> >
> > With that done a client can still do pubkey auth with a DSA key. (How) can I
> > stop sshd from accepting client keys a user might include in
> > ~/.ssh/authorized_keys other than RSA keys?
> 
> By setting PubkeyAcceptedKeyTypes accordingly in sshd_config.

Thanks, I looked and looked and could not find it in the man page. It
appears to be only in -current? Is this possible in prior versions
(i.e. undocumented but works) or is it totally new? 

> This has _nothing_ to do with the server keys.

Understood. I want to do an RSA-only setup. After the server key issue was
resolved I looked at what the clients can do.

> /etc/rc isn't a configuration file.  When you upgrade OpenBSD,
> /etc/rc will be overwritten and your changes will be lost.

I realize that. I keep track of local customizations in a notebook.

Thanks,

/jl

-- 
ASCII ribbon campaign ( ) Powered by Lemote Fuloong
 against HTML e-mail   X  Loongson MIPS and OpenBSD
   and proprietary    / \    http://www.mutt.org
     attachments     /   \  Code Blue or Go Home!
 Encrypted email preferred  PGP Key 2048R/DA65BC04 

Reply via email to