Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Client unable to handle ecdsa-sha2-nistp256 based hosts #883

Closed
Paradoxis opened this issue Feb 2, 2017 · 2 comments
Closed

Client unable to handle ecdsa-sha2-nistp256 based hosts #883

Paradoxis opened this issue Feb 2, 2017 · 2 comments

Comments

@Paradoxis
Copy link

Paradoxis commented Feb 2, 2017

I'm currently using Paramiko to connect to my local SSH server, I'm running into issues however when the server in my known hosts file is using ecdsa-sha2-nistp256. Is there any way of adding support for this?

I'm currently using version 2.1.1 on Python 3.6.0

This is the code I'm using:

self.client = SSHClient()
self.client.load_system_host_keys()
self.client.connect(
    hostname=self.config.server_address,
    port=self.config.server_port,
    username=self.config.auth_username,
    pkey=self.config.auth_public_key )
@ploxiln
Copy link
Contributor

ploxiln commented Feb 2, 2017

What are the issues specifically?

In my experience, ecdsa host keys work if only the ecdsa key is configured on the server side (no rsa key as well). They're supported, but key selection is deficient.

@bitprophet
Copy link
Member

@ploxiln beat me to it - we support that key type last I checked, but there can be issues re: whether both sides of the cxn agree on that particular key and/or algo/cipher.

This has come up a bunch before, see the Keys label and I think a banner issue / appropriate duplicate would be #794.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants