After reading this post in the Digital Ocean blog I added the following to my sshd_config and it now works
PubkeyAcceptedAlgorithms=+ssh-rsa
No, but I have just looked at the Openssh 8.8 release notes and found the following: “This release disables RSA signatures using the SHA-1 hash algorithm
by default.”
Perhaps I need to update my keys. I generated them using Puttygen so I suspect this could affect a lot of people.
As this key type has been deemed to be not secure enough anymore it might be worth adding to the wiki a suggestion to change key types so as to keep the login process secure.
I just removed the line I added to sshd_config and recreated my keys using ED25519 and can now login again.
Hi, after the update I have been unable to access my remote git repository using ssh. Tried regenerating the keys, didn’t work. It seems like ssh can’t see the key file after the update, doesn’t even ask for the passphrase. This is the error:
Unable to negotiate with 40.74.28.0 port 22: no matching host key type found. Their offer: ssh-rsa fatal: Could not read from remote repository.
I used Timeshift to revert to a backup before the update, and everything works normally.
Does anyone know what could be causing this issue?
Generating new keys is most likely not an option at this moment. Hosts are currently only supporting ssh-rsa and according to Atlassian, they are working on rsa-sha2-256 and rsa-sha2-512 implementations. ed25519 will most likely not be supported anytime soon.
For a temporary workaround, only adding PubkeyAcceptedAlgorithms +ssh-rsa is not enough, HostkeyAlgorithms +ssh-rsa is also required.
Issue opening the KDEConnect created Device filesystem in Dolphin (KDE) for my cell… multiple notifications triggered saying Error when accessing filesystem. sshfs finished with exit code 1
According to what I read, the openssh 8.8p1-1 installed with this update release is involved with the issue, and was worked around by downgrading to the previous openssh 8.7p1-2 with the following command (assumes you are locally caching previous package versions via pamac)…
One of the contributors there mentioned that (I assume related to openssh 8.8p1-1)…
“This release disables RSA signatures using the SHA-1 hash algorithm by default.”
So this suggests that an alternative “work around” may be to follow the Lazy Solution found in the Unable to login in remotely using ssh using rsa keys known issue for this update (which I have not tried)… as I assume the “Good Solution” can only be found in an updated version of KDEConnect.
EDIT: My issue was resolved by the newly released KDEConnect 21.08.2-1 and sshfs 3.7.2-2 (Pahvo 21.1.6 release) which are all playing together nicely with openssh 8.8p1-1.