-
-
Notifications
You must be signed in to change notification settings - Fork 6.1k
Closed
Labels
issue/not-a-bugThe reported issue is the intended behavior or the problem is not inside GiteaThe reported issue is the intended behavior or the problem is not inside Gitea
Description
- Gitea version (or commit ref): 1.12.0+dev-320-g4a04740da (docker image d0d4dd915d2e)
- Git version:
- Operating system: Docker on a Synology NAS
- Database (use
[x]
):- PostgreSQLMySQLMSSQLSQLiteTo pick up a draggable item, press the space bar. While dragging, use the arrow keys to move the item. Press space again to drop the item in its new position, or press escape to cancel.
- Can you reproduce the bug at https://try.gitea.io:
- Yes (provide example URL)NoNot relevantTo pick up a draggable item, press the space bar. While dragging, use the arrow keys to move the item. Press space again to drop the item in its new position, or press escape to cancel.
- Log gist:
Description
There is no warning if you click "Add Key" and add a valid DSA public key to your account when openssh will not accept it (that has been the default since 7.0). The result is the usual "Permission denied (publickey)" although if you ssh -v you see "not in PubkeyAcceptedKeyTypes".
Screenshots
Metadata
Metadata
Assignees
Labels
issue/not-a-bugThe reported issue is the intended behavior or the problem is not inside GiteaThe reported issue is the intended behavior or the problem is not inside Gitea
Type
Projects
Milestone
Relationships
Development
Select code repository
Activity
CirnoT commentedon May 15, 2020
This can be configured in config https://github.com/go-gitea/gitea/blob/master/custom/conf/app.ini.sample#L345
Perhaps we should consider updating defaults if that is the case however?
bjj commentedon May 16, 2020
zeripath commentedon May 16, 2020
The best solution would be if you can find a command which will allow us to query the running sshd server to check whether it would accept a key.
zeripath commentedon May 16, 2020
stale commentedon Jul 18, 2020
This issue has been automatically marked as stale because it has not had recent activity. I am here to help clear issues left open even if solved or waiting for more insight. This issue will be closed if no further activity occurs during the next 2 weeks. If the issue is still valid just add a comment to keep it alive. Thank you for your contributions.
stale commentedon Aug 1, 2020
This issue has been automatically closed because of inactivity. You can re-open it if needed.
stale commentedon Oct 4, 2020
This issue has been automatically marked as stale because it has not had recent activity. I am here to help clear issues left open even if solved or waiting for more insight. This issue will be closed if no further activity occurs during the next 2 weeks. If the issue is still valid just add a comment to keep it alive. Thank you for your contributions.
zeripath commentedon Oct 5, 2020
Having looked at this I really don't think there is a way to get OpenSSHD to tell us if it would accept a public key or not. I would be delighted to be proven incorrect but this is therefore a configuration issue.
If your server won't accept DSA keys or any other type of key you need to configure Gitea to refuse them.
bjj commentedon Oct 5, 2020
The config is part of the docker image?! https://github.com/go-gitea/gitea/blob/master/docker/root/etc/templates/sshd_config
zeripath commentedon Oct 5, 2020
Then that's different, put a pr to change the default in the docker - the file is docker/root/etc/templates/app.ini.
The information to set this is in:
https://docs.gitea.io/en-us/config-cheat-sheet/#ssh-minimum-key-sizes-sshminimum_key_sizes
zeripath commentedon Oct 5, 2020
Here you go, here's the patch:
Disable DSA ssh keys by default
Disable DSA ssh keys by default (#13056)