Hi,
Vincent Legoll writes:
> Hello,
>
>> It looks like openssh, at some point in the past ,
>> stopped creating host DSA keys by default. Given the original bug report
>> was that DSA keys were created by default and now they're not I think we
>> can close this bug now.
>>
>> Any objections?
>
>
Hello,
> It looks like openssh, at some point in the past ,
> stopped creating host DSA keys by default. Given the original bug report
> was that DSA keys were created by default and now they're not I think we
> can close this bug now.
>
> Any objections?
This is also my opinion
--
Vincent Lego
On Tue, Jun 18, 2024 at 07:28:35PM +, Vincent Legoll wrote:
> Hello,
>
> I've done some digging on that issue. Hope it'll help.
>
> It looks like the clients still support the DSA keys.
>
> This is on a Void linux desktop:
>
> [vince@destop ~]$ ssh -Q PubkeyAcceptedAlgorithms | grep -i dss
Hello,
I've done some digging on that issue. Hope it'll help.
It looks like the clients still support the DSA keys.
This is on a Void linux desktop:
[vince@destop ~]$ ssh -Q PubkeyAcceptedAlgorithms | grep -i dss
ssh-dss
ssh-dss-cert-...@openssh.com
The following Guix VM has been created 2 day
In the interest of protecting users we should probably not create DCA
keys by default. That would leave us with RSA, ECDSA and ED25519.
--
Efraim Flashner אפרים פלשנר
GPG key = A28B F40C 3E55 1372 662D 14F7 41AA E7DC CA3D 8351
Confidentiality cannot be guaranteed on emails sent or received