Closed EdNett closed 2 weeks ago
BOA supports these keys for years. Not sure what your issue is?
ch5:~# ssh-keyscan -t ecdsa,ed25519 localhost
# localhost:22 SSH-2.0-OpenSSH_9.9
localhost ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBCCdPCPQFLYoctJ1IfAqwvpdIT00WczrLDCVL5CxGAeFvYVNN9j7wZcUjPn/CxVySk2glsgJp8Tvz0HMMleTJSM=
# localhost:22 SSH-2.0-OpenSSH_9.9
localhost ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIM4eCiLyBxi7vVY4DIuTx3jAZ786ZyqtkWGRTNY50m/l
ch5:~#
Hello, The issue is if I have one of these ecdsa-sha2-nistp512 keys, for example, the barracuda up-lts won't run, telling me I need ssh keys, so I put in a 4096 rsa key and then the upgrade is allowed.
Ah, we didn't notice that because we normally have a set of three to be able to support legacy systems, so it works fine.
It looks like this:
~/.ssh/config
Host *
IdentityFile ~/.ssh/id_ed25519
IdentityFile ~/.ssh/id_ecdsa
IdentityFile ~/.ssh/id_rsa
Thank you - I'll go with ed25519 - that's vey strong and very fast.
Hello,
We often use EdDSA and even ED25519 keys instead of rsa 4096 sha2, and boa doesn't accept them, forcing us to add an rsa key. If it's easy, could EdDSA and even ED25519 keys be "acceptable" also (so that an upgrade doesn't fail if those types of keys are used), since those keys are in the process of replacing rsa keys in many ways.
Best,
Ed