New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
paramiko ssh server (2.9.0) always rejects authentication with rsa-sha2-256 and ssh-rsa publickey algorithms #1955
Comments
Weird that this didn't show up in the tests, likely an edge case that got overlooked given the usual focus on client side mode. Thanks for the report! |
Found a test that proves this, will dig into it based on your patch and get 2.9.1 out. |
2.9.1 released for this. Thanks again! |
Thanks for the quick response and fix! Confirmed the issue goes away with paramiko 2.9.1. |
Can you please verify if the bug is partially fixed only as we still have issues to connect with Cyberduck and |
I can confirm that I still hit the same/similar bug on version 2.9.1 using RSA keys. If we switch to password login it does work. Here's the debug trace: Fails:
Works:
Also tried with settings:
Which does change the Key exchange agreements, but I still get the same error:
Code in
Cisco device does not support |
No. This issue is when using paramiko for server purpose. You've used as a client. Visit #1961. |
I tried paramiko 2.9.0 for server purpose, Client with rsa-sha2-512 publickey algorithm works fine, however the server always rejects authentication with rsa-sha2-256 and ssh-rsa publickey algorithms.
Testing using the following command and demo_server.py:
The server mode wrongly ignores the given rsa-sha2-256 in USERAUTH_REQUEST from the client and verity the signature with rsa-sha2-512.
I tried to temporally fix it: jun66j5/paramiko@518e02026.
The text was updated successfully, but these errors were encountered: