Package: openssh-server
Version: 1:7.2p2-5
Tags: patch

Hello Colin.

Since the ssh client no longer wants to connect to a server which has
only a DSA key, because it's considered obsolete and not secure enough,
the logical thing to do for the Debian openssh-server package would be
to stop generating such keys on new systems as well.

[ Did this check: On a sid system I disabled all host keys but DSA and
  then was not able to ssh to localhost anymore ].

While we are at it, this change would also solve Bug #562593,
marked "important" (mips machine hangs at generating DSA2 key).

The attached patch may help, but I've not tested.

Thanks a lot.
--- a/debian/openssh-server.postinst
+++ b/debian/openssh-server.postinst
@@ -81,7 +81,6 @@ host_keys_required() {
                # No HostKey directives at all, so the server picks some
                # defaults.
                echo /etc/ssh/ssh_host_rsa_key
-               echo /etc/ssh/ssh_host_dsa_key
                echo /etc/ssh/ssh_host_ecdsa_key
                echo /etc/ssh/ssh_host_ed25519_key
        fi
@@ -114,8 +113,6 @@ create_keys() {
 
        create_key "Creating SSH2 RSA key; this may take some time ..." \
                "$hostkeys" /etc/ssh/ssh_host_rsa_key -t rsa
-       create_key "Creating SSH2 DSA key; this may take some time ..." \
-               "$hostkeys" /etc/ssh/ssh_host_dsa_key -t dsa
        create_key "Creating SSH2 ECDSA key; this may take some time ..." \
                "$hostkeys" /etc/ssh/ssh_host_ecdsa_key -t ecdsa
        create_key "Creating SSH2 ED25519 key; this may take some time ..." \
@@ -173,7 +170,6 @@ Port 22
 Protocol 2
 # HostKeys for protocol version 2
 HostKey /etc/ssh/ssh_host_rsa_key
-HostKey /etc/ssh/ssh_host_dsa_key
 HostKey /etc/ssh/ssh_host_ecdsa_key
 HostKey /etc/ssh/ssh_host_ed25519_key
 #Privilege Separation is turned on for security

Reply via email to