SSH Connector host key algorithms updated - added rsa-sha2-256 and rsa-sha2-512

In EasyMorph 5.6.0, we have updated the list of supported SSH host key algorithms and added new RSA signature algorithms rsa-sha2-256 and rsa-sha2-512

List of supported algorithms by EasyMorph SSH command:

ssh-ed25519
ecdsa-sha2-nistp256
ecdsa-sha2-nistp384
ecdsa-sha2-nistp521
ssh-rsa
ssh-dss
rsa-sha2-256
rsa-sha2-512

Algorithms rsa-sha2-256 and rsa-sha2-512 are considered more secure than ssh-rsa. The reason is that the SHA-1 hash algorithm used in the ssh-rsa is cryptographically broken, so SHA-1 was replaced with SHA-2. EasyMorph continues to support the ssh-rsa algorithm for compatibility with the older sshd\Linux editions.

In the newer Linux editions, the algorithm ssh-rsa is mostly disabled by the vendor for security reasons.

You could turn off the ssh-rsa and use rsa-sha2-256 or rsa-sha2-512 for the RSA keys. This can be done by updating the sshd server configuration settings PubkeyAcceptedAlgorithms in file /etc/ssh/sshd_config .
Check your sshd/Linux server for the supported algorithms before updating the configuration to prevent lock-in.

PubkeyAcceptedAlgorithms

Specifies the signature algorithms that will be accepted for public key authentication as a list of comma-
separated patterns. Alternately if the specified list begins with a ‘+’ character, then the specified
algorithms will be appended to the default set instead of replacing them. If the specified list begins with
a ‘-’ character, then the specified algorithms (including wildcards) will be removed from the default set
instead of replacing them. If the specified list begins with a ‘^’ character, then the specified algorithms
will be placed at the head of the default set.