Skip to content

Commit f2f5212

Browse files
authored
Update connect-to-your-remote-linux-computer.md
Removing references to RSA/DSA keys due to security concerns
1 parent 58edf0a commit f2f5212

File tree

1 file changed

+6
-3
lines changed

1 file changed

+6
-3
lines changed

docs/linux/connect-to-your-remote-linux-computer.md

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -82,7 +82,10 @@ If `ssh` isn't already set up and running on your Linux system, follow these ste
8282
| **Private key file** | Private key file created for ssh connection |
8383
| **Passphrase** | Passphrase used with private key selected above |
8484

85-
You can use either a password or a key file and passphrase for authentication. For many development scenarios, password authentication is sufficient, but key files are more secure. If you already have a key pair, it's possible to reuse it. Currently Visual Studio only supports RSA and DSA keys for remote connections.
85+
You can use either a password or a key file and passphrase for authentication. For many development scenarios, password authentication is sufficient, but key files are more secure. If you already have a key pair, it's possible to reuse it.
86+
87+
Versions of Visual Studio before 17.10 support EC, RSA and DSA keys for remote connections. Because of security concerns, RSA and DSA keys are no longer supported in VS 17.10 and later. Only EC keys are currently supported. To create a key pair compatible with the connection manager use the command:
88+
`ssh-keygen -m pem -t ecdsa -f <key-name>`
8689

8790
> [!NOTE]
8891
> If using `ssh-keygen` to create the private key, you must specify the switch `-m pem`, or the key will not be accepted by Visual Studio. If your private key begins with `-----BEGIN OPENSSH PRIVATE KEY-----`, you must convert it with `ssh-keygen -p -f <FILE> -m pem`.
@@ -122,7 +125,7 @@ Starting in Visual Studio version 16.9, support for older, insecure SSH algorith
122125
| Encryption | `aes128-cbc`</br>`aes128-ctr`</br>`aes192-cbc`</br>`aes192-ctr`</br>`aes256-cbc`</br>`aes256-ctr` |
123126
| HMAC | `hmac-sha2-256`</br>`hmac-sha2-512` |
124127
| Key exchange | `diffie-hellman-group14-sha256`</br>`diffie-hellman-group16-sha512`</br>`diffie-hellman-group-exchange-sha256`</br>`ecdh-sha2-nistp256`</br>`ecdh-sha2-nistp384`</br>`ecdh-sha2-nistp521` |
125-
| Host key | `ecdsa-sha2-nistp256`</br>`ecdsa-sha2-nistp384`</br>`ecdsa-sha2-nistp521`</br>`ssh-dss`</br>`ssh-rsa` |
128+
| Host key | `ecdsa-sha2-nistp256`</br>`ecdsa-sha2-nistp384`</br>`ecdsa-sha2-nistp521` |
126129

127130
### Configure the SSH server
128131

@@ -178,7 +181,7 @@ For example: `KexAlgorithms ecdh-sha2-nistp256,ecdh-sha2-nistp384`
178181
#### Host key example
179182

180183
Add: `HostKeyAlgorithms <algorithms to enable>`
181-
For example: `HostKeyAlgorithms ssh-dss,ssh-rsa`
184+
For example: `HostKeyAlgorithms ecdsa-sha2-nistp256,ecdsa-sha2-nistp384`
182185

183186
## Logging for remote connections
184187

0 commit comments

Comments
 (0)