https://bugzilla.mindrot.org/show_bug.cgi?id=3375
--- Comment #7 from Damien Miller <[email protected]> --- Created attachment 3562 --> https://bugzilla.mindrot.org/attachment.cgi?id=3562&action=edit client side Similarly, if you want to avoid use of RSA-SHA1 completely then you also need to ensure the client only accepts RSA-SHA2 signatures. This patch to the client does this. It will disregard hostkey proofs if they use ssh-rsa except when it has been explicitly negotiated as the hostkey algorithm. AFAIK this should be fine for backwards compatibility, except for the case when a <openssh-8.9 server is configured with multiple RSA keys. I expect this to be a rare situation. -- You are receiving this mail because: You are watching someone on the CC list of the bug. You are watching the assignee of the bug. _______________________________________________ openssh-bugs mailing list [email protected] https://lists.mindrot.org/mailman/listinfo/openssh-bugs
