Code: Select all
debug1: Offering public key: /home/my_user/.ssh/id_rsa RSA SHA256:2******************************Y agent
debug1: send_pubkey_test: no mutual signature algorithm
debug1: Offering public key: /home/my_user/.ssh/id_rsa RSA SHA256:2******************************Y agent
debug1: send_pubkey_test: no mutual signature algorithm
host <router name or IP address>
KexAlgorithms +diffie-hellman-group1-sha1
HostKeyAlgorithms +ssh-dss
host r01.eger.magnet
hostname r01.eger.magnet
KexAlgorithms +diffie-hellman-group1-sha1
HostKeyAlgorithms +ssh-dss
debug3: authmethod_is_enabled publickey
debug1: Next authentication method: publickey
debug1: Offering public key: /home/user/.ssh/id_rsa RSA SHA256:2****************************Y agent
debug1: send_pubkey_test: no mutual signature algorithm
PubkeyAcceptedAlgorithms +ssh-rsa
KexAlgorithms +diffie-hellman-group1-sha1
HostKeyAlgorithms +ssh-dss
PubkeyAcceptedAlgorithms +ssh-rsa
Match host 192.168.1.1,vpn.darkdragon.lan
PubkeyAcceptedAlgorithms +ssh-rsa
Ignore the options above... What you need is:
Code: Select allPubkeyAcceptedAlgorithms +ssh-rsa
Host gulp
Hostname gulp.bach.redacted.com
Port 22
User paul
KexAlgorithms +diffie-hellman-group1-sha1
HostKeyAlgorithms +ssh-dss
PubkeyAcceptedAlgorithms +ssh-rsa
echo "PubkeyAcceptedAlgorithms +ssh-rsa" | sudo tee /etc/ssh/ssh_config.d/rsa-support.conf
So you could create a new key with this:*) ssh - added support for Ed25519 key exchange;
*) ssh - do not allow SHA1 usage with strong crypto enabled;
*) ssh - fixed handling of non standard size RSA keys;
ssh-keygen -t ed25519 -b 4096
As @eworm mentioned on another thread, from router OS 7.7 the ed25519 keys are supported, from the changelog:*) ssh - added support for Ed25519 key exchange;
As @eworm mentioned on another thread, from router OS 7.7 the ed25519 keys are supported, from the changelog:
You're right, I missunderstood your comments, let's see if they add the ed25519 for authentication soon...As @eworm mentioned on another thread, from router OS 7.7 the ed25519 keys are supported, from the changelog:
That is not true. I did not write that.
To date only ed25519 key exchange is supported. Let's hope we will see support for host keys and public key authentication soon.
HostKeyAlgorithms +ssh-dss
PubkeyAcceptedAlgorithms +ssh-rsa
/home/user/.ssh/config line 6: Bad key types '+ssh-dss'.
/home/user/.ssh/config: terminating, 1 bad configuration options
ThanksNewer linux distributions are depreciating ...