--- Begin Message ---
Subject: |
openssh service creates DSA keys |
Date: |
Thu, 26 Nov 2020 17:14:03 +0200 |
In the interest of protecting users we should probably not create DCA
keys by default. That would leave us with RSA, ECDSA and ED25519.
--
Efraim Flashner <efraim@flashner.co.il> אפרים פלשנר
GPG key = A28B F40C 3E55 1372 662D 14F7 41AA E7DC CA3D 8351
Confidentiality cannot be guaranteed on emails sent or received unencrypted
signature.asc
Description: PGP signature
--- End Message ---
--- Begin Message ---
Subject: |
Re: bug#44887: openssh service creates DSA keys |
Date: |
Wed, 19 Jun 2024 16:10:39 -0400 |
User-agent: |
Gnus/5.13 (Gnus v5.13) |
Hi,
Vincent Legoll <vincent.legoll@gmail.com> writes:
> Hello,
>
>> It looks like openssh, at some point in the past <period-of-time>,
>> stopped creating host DSA keys by default. Given the original bug report
>> was that DSA keys were created by default and now they're not I think we
>> can close this bug now.
>>
>> Any objections?
>
> This is also my opinion
Super, doing so. This is the best kind of resolution ;-).
--
Thanks,
Maxim
--- End Message ---