Unable to negotiate : no matching host key type found - McKAY brothers, multimedia emulation and support

About McKAY's blog

ads

Post Top Ad

Your Ad Spot

2024/06/07

Unable to negotiate : no matching host key type found

This is a problem with older devices.. and some host (here you will find solution and why happened): 

Unable to negotiate with 192.168.8.109 port 22: no matching host key type found. Their offer: ssh-dss

The problem is that such algoritm was deprecated becouse nowadays the current computers are enought powerfully to breack such encription.. so developers deprecated and eliminated in flavoour of some more hard to beat.

In more technical way: OpenSSH is removing support for older signature algorithms that may become less secure in the future due increased computers power. Details of the deprecation are in the Release Notes for OpenSSH 8.7: https://www.openssh.com/txt/release-8.7. RFC 4253 explicitly calls out this hash-of-hash behavior in  https://datatracker.ietf.org/doc/html/rfc4253#section-8

But we can do to connect it? well there are two kind of solutions, the most compatible and weak and the most secure and less compatible.

SOLUTION MORE WEAK BUT COMPATIBLE:

Just add -oHostKeyAlgorithms=+ssh-dss to the ssh command line when you try to connect.. or add HostKeyAlgorithms=+ssh-dss to the ssh options per hots in the config file at $HOME/.ssh/config or /etc/ssh/ssh_config.

This option is the less secure but is the most compatible! The most older devices will only accept this option.

SOLUTION MORE SECURE BUT LESS COMPATIBLE!

Just add -oHostKeyAlgorithms=+ssh-rsa -oPubkeyAcceptedKeyTypes=+ssh-rsa to the ssh command line when you try to connect.. or add HostKeyAlgorithms +ssh-dss and PubkeyAcceptedKeyTypes +ssh-rsa also to the ssh options per hots in the config file at $HOME/.ssh/config or /etc/ssh/ssh_config.!

This option is the most secure secure but is the less compatible! The most older devices will never accept this option.

EXPLANATION

Default configurations of some newer SSH clients have dropped support for older signature algorithms used during the authentication process. Affected SSH clients are unable to complete authentication and an error is displayed.

Why RSA evnet DSA for workaround? While ssh-rsa is insecure when signing arbitrary (i.e. attacker-controlled) data, that doesn’t help an attacker in this case. In the context of an SSH handshake, ssh-rsa signature algorithm does not present a vulnerability that can be exploited to decrypt traffic or impersonate another user.




No hay comentarios.:

Publicar un comentario

no stupid winbuntu users allowed!

Entradas populares

Post Top Ad

Your Ad Spot