Showing results for 
Search instead for 
Did you mean: 
Sign up Log in

OpenSSH 8.7 and ssh-rsa host key

fedejko September 8, 2021


OpenSSH disabled the ssh-rsa signature scheme and now when I want to push/pull to/from my repositories I receive the following error:

Unable to negotiate with port 22: no matching host key type found. Their offer: ssh-rsa,ssh-dss
fatal: Could not read from remote repository.

Please make sure you have the correct access rights
and the repository exists.

What can I do to make it work?

9 answers

1 accepted

15 votes
Answer accepted
carlos.perez-lopez September 27, 2021

This worked for me:

HostkeyAlgorithms +ssh-rsa
PubkeyAcceptedAlgorithms +ssh-rsa


joel.kuepper September 28, 2021

Well, although this works, this is a workaround, rather than a solution. There is a very good security reason, OpenSSH (finally) disabled ssh-rsa (which is based on SHA-1, theoretially broken 2004, practially broken 2017, cheaply broken 2020 )

The solution is for bitbucket to allow up-to-date hash algorithms.

See my related question.

Like # people like this
Jeff Thomas
Atlassian Team
Atlassian Team members are employees working across the company in a wide variety of roles.
September 29, 2021

@joel.kuepper are you having trouble adding keys with newer hashing algorithms? Support for ECDSA and ED25519 SSH keys was added in August 2016 -
Or, is it a different one other than ECDSA or ED25519 that you're looking for?

//Edit: Ah, I see the issue. Bitbucket Cloud is not offering a new algorithm for the host key.

Like # people like this
joel.kuepper September 30, 2021

@Jeff Thomas Yes, you are correct, I am referring to the host key algorithm. So what happens now that you are aware of this?

(When) can we expect Bitbucket to offer new hash algorithms (in the coming days, weeks, months)?

Mauro Mombelli October 1, 2021

@Jeff Thomasplease fix ASAP, any day now and when ubuntu/windows update openssh this issue will really explode

Like joel.kuepper likes this
Jeff Thomas
Atlassian Team
Atlassian Team members are employees working across the company in a wide variety of roles.
October 1, 2021

I'm not from the Bitbucket Cloud team, but that team is aware of the issue. 

Like # people like this
arag0re October 7, 2021

Helped me a lot, thanks ser!

Yves Martin
Rising Star
Rising Star
Rising Stars are recognized for providing high-quality answers to other users. Rising Stars receive a certificate of achievement and are on the path to becoming Community Leaders.
October 13, 2021


Please vote tickets !

- for Bitbucket Server on-premise


Like renehamburger likes this
Deleted user October 14, 2021

Gracias Hermano !! Esto si que me ayudo !!!
Thanks Carlos,Helped me a lot !!!

Like carlos.perez-lopez likes this
Anthony Erbe October 18, 2021

This helped. Would be good to allow newer algos, I have to use newer algos with other tools so I have to balance multiple keys until this is solved.

joel.kuepper October 25, 2021

Just FYI, if you did not follow the issue-tracker; it is solved now. You can remove the +ssh-rsa entry from the config file

3 votes
Richard Lees October 5, 2021

Bitbucket have had a long time to support other keys. AWS also has lagged here but for authentication public keys (not host keys) but now supports ED25519.

Bitbucket has just stood there and done absolutely nothing and the only way to use it now is to lower the security of your system.

If you apply the security degrading workaround make sure it is JUST for the host and not everything.

Hopefully this will help organisations break the "well its free with Jira so let's just use it" way of thinking and move to a real Git hosting provider.

1 vote
tosemusername October 15, 2021

LMAO how is this not fixed yet?! 1 week away from this issue turning a month old putting aside the enormous complacency that led to this debacle in the first place.

1 vote
Theodora Boudale
Atlassian Team
Atlassian Team members are employees working across the company in a wide variety of roles.
October 6, 2021

Hi everyone,

One of our engineering managers has published a community article with more info on the issue as well as workarounds:

The Bitbucket team is working on adding the updated signature support to our SSH server and we will provide another update once these changes have been implemented.

If you'd like to get notified on updates, you can watch either the community article or this BCLOUD ticket.

Kind regards,

1 vote
Pavel Žák October 1, 2021

As of 2021-10-01 I cannot connect to Bitbucket via SSH without re-enabling ssh-rsa after updates on Arch Linux. It's absolutely ridiculous, that I just went through the support article recommending to use ed25519 key and finding out that Bitbucket does not accept ed25519 :-D

Atlassians, please fix this.

Unable to negotiate with port 22: no matching host key type found. Their offer: ssh-rsa,ssh-dss
marcusball October 1, 2021

Did you try the config change from my comment above? I'm also using Arch and ED25519 is working, but I had to add the `HostKeyAlgorithms +ssh-rsa` line to my `~/.ssh/config` file for in order for it to work.

Christopher Graney-Ward October 18, 2021

@marcusball Didn't work on windows

1 vote
marcusball September 27, 2021

I just started getting this issue today, as well. This seems absolutely ridiculous that Bitbucket hasn't upgraded to support any of the new SSH key types yet.

fedejko September 27, 2021

Exactly. But GitLab offers a nice migration tool. I just moved my repos over there.

Like Pedro Fonini likes this
marcusball September 27, 2021

Unfortunately this is my company's repo; I'd move it over in a heartbeat if it wouldn't mean migrating everyone else and the various connected services.

Like joel.kuepper likes this
marcusball September 27, 2021


Okay, I think I figured out a solution. I used some of the SSH config change from this answer, and created a new SSH key based on this article.

Basically, I made a new key using ED25519 (`ssh-keygen -t ed25519`), added it to my Bitbucket profile, and added ssh-rsa to the HostKeyAlgorithms in `~/.ssh/config`:

User git
IdentityFile ~/.ssh/id_ed25519
HostKeyAlgorithms +ssh-rsa
Like # people like this
joel.kuepper September 28, 2021

I hope you know what that means. OpenSSH disabled this insecure algorithm, and you explicitly enable it again. This should not be a long-term solution imo, but we can only wait for bitbucket to fix this.

1 vote
fedejko September 15, 2021

On OpenBSD 6.9, OpenSSH 8.6 this problem does not exist. On my laptop I'm on OpenBSD-current, which now uses OpenSSH 8.7 and I think it's because they made this change:

OpenSSH will disable the ssh-rsa signature scheme by default in the
next release.

In the SSH protocol, the "ssh-rsa" signature scheme uses the SHA-1
hash algorithm in conjunction with the RSA public key algorithm.
It is now possible[1] to perform chosen-prefix attacks against the
SHA-1 algorithm for less than USD$50K.

Note that the deactivation of "ssh-rsa" signatures does not necessarily
require cessation of use for RSA keys. In the SSH protocol, keys may be
capable of signing using multiple algorithms. In particular, "ssh-rsa"
keys are capable of signing using "rsa-sha2-256" (RSA/SHA256),
"rsa-sha2-512" (RSA/SHA512) and "ssh-rsa" (RSA/SHA1). Only the last of
these is being turned off by default.

This algorithm is unfortunately still used widely despite the
existence of better alternatives, being the only remaining public key
signature algorithm specified by the original SSH RFCs that is still
enabled by default.

The better alternatives include:

 * The RFC8332 RSA SHA-2 signature algorithms rsa-sha2-256/512. These
   algorithms have the advantage of using the same key type as
   "ssh-rsa" but use the safe SHA-2 hash algorithms. These have been
   supported since OpenSSH 7.2 and are already used by default if the
   client and server support them.

 * The RFC8709 ssh-ed25519 signature algorithm. It has been supported
   in OpenSSH since release 6.5.

 * The RFC5656 ECDSA algorithms: ecdsa-sha2-nistp256/384/521. These
   have been supported by OpenSSH since release 5.7.

To check whether a server is using the weak ssh-rsa public key
algorithm, for host authentication, try to connect to it after
removing the ssh-rsa algorithm from ssh(1)'s allowed list:

    ssh -oHostKeyAlgorithms=-ssh-rsa user@host

If the host key verification fails and no other supported host key
types are available, the server software on that host should be

OpenSSH recently enabled the UpdateHostKeys option by default to
assist the client by automatically migrating to better algorithms.

[1] "SHA-1 is a Shambles: First Chosen-Prefix Collision on SHA-1 and
    Application to the PGP Web of Trust" Leurent, G and Peyrin, T

1 vote
ramonmoraesintegritas September 8, 2021

Facing the same issue here. Not sure if the fact that I heavily rely on the .ssh/config file helps on make this issue happen.

fedejko September 9, 2021

Me too, I added

HostbasedAcceptedAlgorithms +ssh-rsa

but it didn't help.

Wondering about migrating my repos to GitHub. This issue does not exist there.

ramonmoraesintegritas September 15, 2021

I made a quick research and sounds like the issue when using OpenSSH >= 8.5

If you're using an OS that already upgrade to this version (or higher) the best solution for now is creating Access Tokens and updating the remote URL address to HTTP format

fedejko September 15, 2021

Maybe it's because of the change they mention here:

Like joel.kuepper likes this
0 votes
xxx xxx July 3, 2022

I really appreciate all the help provided by this forum, I was dealing with this issue for a long, it did work, also, I'd like to share this information about SSH on Kali

Suggest an answer

Log in or Sign up to answer
AUG Leaders

Atlassian Community Events