Hi Gyorgy,
On Wed, 16 Nov 2022 at 10:55, Gyorgy Szing Gyorgy.Szing@arm.com wrote:
Hi,
Well, your error code is different, but could it be this OpenSSH version conflict?: https://blog.hqcodeshop.fi/archives/525-OpenSSH-8.8-dropped-SHA-1-support.ht...
Might be worth to try setting SSH to verbose mode with GIT_SSH_COMMAND as described here: https://askubuntu.com/questions/336907/really-verbose-way-to-test-git-connec...
I used: ssh -vvvv -p 29418 jforissier@review.trustedfirmware.org and I got:
debug1: Offering public key: /home/jerome/.ssh/id_rsa RSA SHA256:kXuqKtZUYlCLS0w7nUZsU4Rn610YUzXxwzWC4HhaDTI agent debug1: send_pubkey_test: no mutual signature algorithm
My key is 2048 bit RSA. The following works:
ssh -vvvv -o 'PubkeyAcceptedAlgorithms +ssh-rsa' -p 29418 jforissier@review.trustedfirmware.org debug1: Offering public key: /home/jerome/.ssh/id_rsa RSA SHA256:kXuqKtZUYlCLS0w7nUZsU4Rn610YUzXxwzWC4HhaDTI agent debug3: send packet: type 50 debug2: we sent a publickey packet, wait for reply debug3: receive packet: type 60 debug1: Server accepts key: /home/jerome/.ssh/id_rsa RSA SHA256:kXuqKtZUYlCLS0w7nUZsU4Rn610YUzXxwzWC4HhaDTI agent
So I added an entry to my ~/.ssh/config:
Host review.trustedfirmware.org PubkeyAcceptedAlgorithms +ssh-rsa
My understanding is that the server is using a method that is now considered weak, isn't it?
Thanks,