bug#44887: openssh service creates DSA keys

2024-06-19 Thread Maxim Cournoyer
Hi, Vincent Legoll writes: > Hello, > >> It looks like openssh, at some point in the past , >> stopped creating host DSA keys by default. Given the original bug report >> was that DSA keys were created by default and now they're not I think we >> can close this bug now. >> >> Any objections? > >

bug#44887: openssh service creates DSA keys

2024-06-19 Thread Vincent Legoll
Hello, > It looks like openssh, at some point in the past , > stopped creating host DSA keys by default. Given the original bug report > was that DSA keys were created by default and now they're not I think we > can close this bug now. > > Any objections? This is also my opinion -- Vincent Lego

bug#44887: openssh service creates DSA keys

2024-06-19 Thread Efraim Flashner
On Tue, Jun 18, 2024 at 07:28:35PM +, Vincent Legoll wrote: > Hello, > > I've done some digging on that issue. Hope it'll help. > > It looks like the clients still support the DSA keys. > > This is on a Void linux desktop: > > [vince@destop ~]$ ssh -Q PubkeyAcceptedAlgorithms | grep -i dss

bug#44887: openssh service creates DSA keys

2024-06-18 Thread Vincent Legoll
Hello, I've done some digging on that issue. Hope it'll help. It looks like the clients still support the DSA keys. This is on a Void linux desktop: [vince@destop ~]$ ssh -Q PubkeyAcceptedAlgorithms | grep -i dss ssh-dss ssh-dss-cert-...@openssh.com The following Guix VM has been created 2 day

bug#44887: openssh service creates DSA keys

2020-11-26 Thread Efraim Flashner
In the interest of protecting users we should probably not create DCA keys by default. That would leave us with RSA, ECDSA and ED25519. -- Efraim Flashner אפרים פלשנר GPG key = A28B F40C 3E55 1372 662D 14F7 41AA E7DC CA3D 8351 Confidentiality cannot be guaranteed on emails sent or received