Hi,
I am struggling to figure out how to make ssh client to tell the server
to authenticate it with provided type of the key ie RSA and not ECDSA etc.

My use case:
There is an application (ovirt-engine) that manages some hosts. It
connect using ssh to its hosts in various scenarios (ie. host reboot).

Historically, after the host was registered to the pool of hosts being
managed by ovirt-engine, host's public key fingerprint was generated and
stored in database. At that time only RSA keys were allowed. That used
to be done with NamedFactory<Signature> and then with
client.setSignatureFactories( ... )

Now, we have added support for whatever key type is available (usually
the strongest that SSHD can serve). For backward compatibility we would
like to allow using 'legacy' RSA keys for hosts already registered.

Nowadays, we store the public keys so we can figure out its type and
choose proper Signature. However, I am wondering if there is more
implicit way in API to configure ssh client so that it could negotiate
with server key type.

I will appreciate any hints / comments.

best,
Artur

Attachment: OpenPGP_signature
Description: OpenPGP digital signature

Reply via email to