Closed oskar456 closed 7 years ago
Mosh for Chrome doesn't currently support SHA-256 (see here). It really needs to (especially in light of SHA-1 being "SHAttered"), but when I wrote this, the version of libssh I was using didn't have support for that hash, and I didn't have time to dig deeper.
The code only checks for SHA-1, and since you have none, it is in a quandary. I'm thinking the right behavior is to act like there was never any SSHFP record at all, and fall back to the "make the user check the fingerprint" behavior.
Of course, getting SHA-256 support is preferred (as you say), but even then, if a new unsupported hash is introduced, the behavior needs to be right.
I have a SSH server with bunch of SHA-2 SSHFP records:
Even though the fingerprint is valid (I use it daily from a Linux machine) when used by Mosh app, I'll get this scary warning:
I guess the problem would be in SHA-256 fingerprints not supported. This should be fixed by either validating SHA-256 (according to RFC 6594 SHA-1 fingerprint should not be considered when there is are SHA-256 fingerprints present) or set up in a way that SSHFP records with type 2 fingerprint are not considered at all. The former fix is obviously preferred.