Re: Authenticating to dropbear using ecdsa-sha2-nistp256

2022-11-10 Thread Rogan Dawes
On Fri, 11 Nov 2022 at 03:20, Matt Johnston  wrote:

> On Tue, Nov 08, 2022 at 04:57:40PM +0200, Rogan Dawes wrote:
> > The targets that I have available are OpenWrt 21.02.1 running Dropbear
> > v2020.81 and 22.03.0 running Dropbear v2022.82.
>
> Ah, OpenWRT doesn't include ecdsa support (for size
> reasons) - only remembered that now. You'll have to use rsa
> or ed25519 instead if possible.
>
> It's possible to rebuild their package with the DROPBEAR_ECC
> openwrt config option.
>
> Cheers,
> Matt


I was under the impression that the ssh protocol included a handshake step
where supported algorithms were exchanged, and keys that do not match are
eliminated?

I’ll check what that shows in the logs.

Thanks

Rogan


>


Authenticating to dropbear using ecdsa-sha2-nistp256

2022-11-09 Thread Rogan Dawes
Hi folks,

I have created an SSH private key in my M1 Mac's Secure Enclave, and am
using it to SSH to various targets. Those using OpenSSH work fine, and I am
prompted to unlock the SE. However, those using dropbear do not work,
giving me the following result on the client:

debug1: Offering public key: ecdsa-sha2-nistp256 ECDSA SHA256:XXX agent
debug3: send packet: type 50
debug2: we sent a publickey packet, wait for reply
debug3: receive packet: type 51
debug1: Authentications that can continue: publickey

I have tried to enable verbose logging on the server side, but have not
been able to find any option to actually do this.

The targets that I have available are OpenWrt 21.02.1 running Dropbear
v2020.81 and 22.03.0 running Dropbear v2022.82.

Thanks

Rogan