


Therefore, do not generate new keys shorter than 4096 bit characters! 1 Since 2013 the ENISA ( European Union Agency for Cybersecurity) recommends the usage of keys with a length of 2048 bit for short-term security only. However, advancing 40 years, keys are no longer really secure if they are less than 1024 bit long. Computers were slow, and it might take several decades until RSA would be rendered insecure by cracking the algorithm. Invented back in 1977, RSA seemed to be the best solution to generate secure keys. Why RSA might not serve you well for the next decades

If you are not interested in the why, but in the how, you may jump directly to the third headline. Those keys are mostly generated by using the RSA algorithm, which was and still is the standard for generating the cryptographic keys.

OPENSSH RSA PASSWORD
At least I haven’t heard of anybody typing his username and password into the terminal while pushing the latest commits to the remote repository.
OPENSSH RSA FREE
The release notes also contain a warning about the intention to change the default scp utility to use SFTP instead of the legacy SCP / RCP protocol. The SFTP apply more predictable methods names, and non-processing is used glob-patterns in filenames through the shell on the side of the other host, which creates problems with security… In particular, when using SCP and RCP, the server decides which files and directories to send to the client, and the client only checks the correctness of the returned object names, which, in the absence of proper checks on the client side, allows the server to transmit other file names that differ from the requested ones. The SFTP protocol is free of these problems, but does not support the expansion of special paths such as “~ /”. To address this difference, in the previous release of OpenSSH, a new SFTP extension was proposed in the SFTP server implementation to expose the ~ / and ~ user / paths.As a developer, the chances are pretty high that you have your own SSH keys to connect to servers, and be it only the server hosting the git repository. The new version also resolves a security issue caused by sshd, since OpenSSH 6.2, incorrectly initializing the user group when executing commands specified in the Authorized Keys Command and Authorized Principals Command directives. These directives should ensure that commands are run under a different user, but in fact they inherited the list of groups used when starting sshd. Potentially, this behavior, given certain system settings, allowed the running handler to gain additional privileges in the system.
OPENSSH RSA MANUAL
In most cases, the end of support for “ssh-rsa” will not require any manual action from users, since the UpdateHostKeys setting was previously enabled by default in OpenSSH, which automatically translates clients to more reliable algorithms. For migration, the “ ” protocol extension is used, which allows the server, after passing the authentication, to inform the client about all available host keys. When connecting to hosts with very old versions of OpenSSH on the client side, you can selectively revert the ability to use “ssh-rsa” signatures by adding to ~ /. The end of support for “ssh-rsa” signatures is due to an increase in the effectiveness of collision attacks with a given prefix (the cost of collision guessing is estimated at about 50 thousand dollars). To test the use of ssh-rsa on your systems, you can try connecting via ssh with the “-oHostKeyAlgorithms = -ssh-rsa” option. Support for RSA signatures with SHA-256 and SHA-512 (rsa-sha2-256 / 512) hashes, which are supported since OpenSSH 7.2, is unchanged. Published the release of OpenSSH 8.8, an open client and server implementation for the SSH 2.0 and SFTP protocols. The release is notable for disabling by default the ability to use digital signatures based on RSA keys with a SHA-1 hash (“ssh-rsa”).
