<div><br></div><div><br><div class="gmail_quote"><div dir="ltr" class="gmail_attr">On Fri, 11 Nov 2022 at 07:40, Matt Johnston <<a href="mailto:matt@ucc.asn.au">matt@ucc.asn.au</a>> wrote:<br></div><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left-width:1px;border-left-style:solid;padding-left:1ex;border-left-color:rgb(204,204,204)"><div>
<p>On 2022-11-11 11:50 am, Rogan Dawes wrote:</p>
<blockquote type="cite" style="padding:0px 0.4em;border-left-width:2px;border-left-style:solid;margin:0px;border-left-color:rgb(16,16,255)">
<div>
<div dir="auto">I was under the impression that the ssh protocol included a handshake step where supported algorithms were exchanged, and keys that do not match are eliminated?</div>
</div>
</blockquote>
<div>
<div class="gmail_quote"> </div>
<div class="gmail_quote">For public key auth the client sends each public key it has to offer, the server sends a "key OK" message if it's accepted, and then the client sends its signature. So Dropbear on openwrt gets the ecdsa key offer and sends a failure response since it doesn't accept that ecdsa key type.</div></div></div><div><div>
<div class="gmail_quote"> </div>
<div class="gmail_quote">Matt</div></div></div></blockquote><div dir="auto"><br></div><div dir="auto">Understood, thank you.</div><div dir="auto"><br></div><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left-width:1px;border-left-style:solid;padding-left:1ex;border-left-color:rgb(204,204,204)"><div><div><div class="gmail_quote" dir="auto"></div>
</div>
</div>
</blockquote></div></div>