|
From: Frank C. <fr...@cr...> - 2016-04-28 10:32:35
|
Alexander, Thanks for that patch. I did notice that recently and was going to code something up to fix it, however, you beat me to it. I'll apply it shortly. I was also thinking of going further and making it a possible configuration option, either globally or on a host by host basis. What do you think? Regards Frank On Thu, 2016-04-28 at 16:10 +0800, Alexander List wrote: > Hi, > > unfortunately the key types used for SSH connections are hardcoded in > safekeep. > > Ubuntu 16.04 LTS comes with a newer version of OpenSSH which does not > permit ssh-dss keys anymore by default. That means people who upgrade > their machines will see their backups failing all of a sudden. > > The first step to rectify this is to add ed25519 to the list of > supported keys, the second step is to use RSA keys instead of DSS > keys, > and bumping up the key length from 1024 to 4096 bits. > > I don't think we have to move to automatically generating ed25519 > keys > for now, as that may not work with older clients to be backed up... > > Attached is a patch that achieves steps 1 and 2. > > BTW, it would be great if you could move to github.com - then this > would > just have been a pull request ;) > > Best regards > > Alex > > > ------------------------------------------------------------------- > ----------- > Find and fix application performance issues faster with Applications > Manager > Applications Manager provides deep performance insights into multiple > tiers of > your business applications. It resolves application problems quickly > and > reduces your MTTR. Get your free trial! > https://ad.doubleclick.net/ddm/clk/302982198;130105516;z > _______________________________________________ > Safekeep-devel mailing list > Saf...@li... > https://lists.sourceforge.net/lists/listinfo/safekeep-devel |