I've got the ssh-chat server running. Tor is catching it. It's trying to do ssh stuffs, but fails.
I am attempting to log in with a generated key, and I get this: Unable to negotiate with [redacted] port [redacted]: no matching host key type found. Their offer: ssh-rsa
This proves that I am, indeed, reaching the ssh-chat server and communicating with it. I'm just not doing it right...
I did a big look into the intartoobz and found this:
https://stackoverflow.com/questions/69875520/unable-to-negotiate-with-40-74-28-9-port-22-no-matching-host-key-type-found-th
I note that when I generate the key, it defaults to SHA-256. What I glean from the above link is that ssh-chat wants an SHA-1 (which is lame).
So, I can either:
1) Get ssh-chat to accept SHA-256 keys instead:
RTFM?
Ask the devboi of ssh-chat?
2) Generate a lame, weak SHA-1 soykey.
Option #1 is preferred.
Option #2 would at least let me prove this infernal contraption works, then I can unsoy it later.
I'm trying Option #2...
https://www.freebsd.org/cgi/man.cgi?query=ssh-keygen&sektion=1&manpath=OpenBSD
-t dsa | ecdsa | ecdsa-sk | ed25519 | ed25519-sk | rsa
Specifies the type of key to create. The possible values are
"dsa", "ecdsa", "ecdsa-sk", "ed25519", "ed25519-sk", or "rsa".
This flag may also be used to specify the desired signature type
when signing certificates using an RSA CA key. The available RSA
signature variants are "ssh-rsa" (SHA1 signatures, not recom-
mended), "rsa-sha2-256", and "rsa-sha2-512" (the default).
No matter what I specify, I get a SHA-256...
ssh-keygen does not obey.