← Back to all briefings
Developer 5 min read Published Updated Credibility 90/100

OpenSSH 8.2 introduces FIDO2 support and deprecates ssh-rsa

OpenSSH 8.2 adds FIDO/U2F hardware token support for authentication. You can now use YubiKeys and similar devices for SSH without PAM hacks. SHA-1 signatures are also deprecated in certificates—start planning your migration.

Verified for technical accuracy — Kodi C.

Developer pillar illustration for Zeph Tech briefings
Developer enablement and platform engineering briefings

OpenBSD released OpenSSH 8.2 on , adding first-class support for FIDO/U2F security keys via the new sk-* key types and signaling removal of ssh-rsa signatures that rely on SHA-1. The update also fixes memory safety issues in the sftp server and clarifies default configuration behaviors. This release marks a significant evolution in SSH authentication capabilities, bringing hardware-backed security to one of the most widely used remote access protocols.

FIDO/U2F Security Key Support

OpenSSH 8.2 introduces native support for FIDO/U2F hardware security keys through two new key types: ecdsa-sk (ECDSA with security key) and ed25519-sk (Ed25519 with security key). These key types require a physical security key (such as YubiKey, SoloKey, or other FIDO-compatible devices) to be present during authentication, providing phishing-resistant two-factor authentication for SSH access.

Hardware-backed authentication addresses a fundamental weakness in traditional SSH key authentication: private keys stored on disk can be stolen through malware, backup compromise, or insider access. With FIDO keys, the private key material never leaves the hardware security key. Even if an attacker compromises a user's workstation, they cannot extract the SSH private key or authenticate without physical access to the security device.

The setup supports both resident and non-resident keys. Resident keys store the key handle on the security key itself, enabling authentication from any workstation where the user plugs in their hardware key. Non-resident keys require the key handle to be stored in the user's ~/.ssh directory alongside the public key, but the cryptographic operations still occur on the hardware device.

Organizations deploying FIDO keys should establish provisioning workflows including security key procurement, user enrollment, and backup key procedures. Unlike traditional SSH keys that can be trivially regenerated, losing a hardware security key requires recovery procedures. If you are affected, consider providing users with backup keys or maintaining emergency access mechanisms.

SHA-1 Signature Deprecation and ssh-rsa Sunset

OpenSSH 8.2 announces the planned deprecation of ssh-rsa public key signatures that use the SHA-1 hash algorithm. While RSA keys themselves remain supported, the legacy signature scheme using SHA-1 will be disabled by default in a future release. This change addresses long-standing concerns about SHA-1's collision resistance, which has been showed exploitable in practice.

The deprecation affects both host key verification and user authentication. Systems still using RSA keys with SHA-1 signatures will fail to authenticate once the deprecation takes effect. Organizations must audit their SSH infrastructure and update configurations or regenerate keys before the sunset deadline.

Modern RSA signatures should use the rsa-sha2-256 or rsa-sha2-512 algorithms, which replace SHA-1 with SHA-2 family hashes. OpenSSH has supported these algorithms since version 7.2, providing a migration path that does not require key regeneration—the same RSA keys can be used with new signature algorithms. Alternatively, organizations can migrate to Ed25519 keys, which offer equivalent security with smaller key sizes and faster operations.

Configuration changes may be required on both clients and servers. The PubkeyAcceptedKeyTypes and HostKeyAlgorithms directives control which algorithms are permitted. If you are affected, test compatibility across their SSH infrastructure before making restrictive configuration changes, as older clients or servers may not support SHA-2 RSA signatures.

Security Fixes and Improvements

OpenSSH 8.2 addresses several security issues in addition to the cryptographic improvements. Memory safety fixes in the sftp server address potential vulnerabilities in file transfer operations. While specific exploitation details were not published, organizations using SFTP services should focus on the upgrade to address these issues.

The release clarifies default configuration behaviors that had caused confusion in previous versions. Documentation improvements help administrators understand the security implications of various configuration options. These changes reduce the likelihood of misconfiguration leading to security weaknesses.

Certificate-related improvements improve support for SSH certificates, which provide a flexible alternative to traditional public key distribution. Organizations using certificate-based authentication benefit from improved certificate parsing and validation. Certificate authorities can issue time-limited certificates that automatically expire, reducing the operational burden of key rotation.

Migration Planning and Compatibility Assessment

If you are affected, inventory their SSH infrastructure to assess migration requirements. Key areas to evaluate include client software versions across developer workstations and jump hosts, server software versions on production and development systems, automation and scripting that uses SSH for connectivity, and configuration management tools that distribute SSH keys or configurations.

Test environments should validate compatibility before production rollout. Create test scenarios covering user interactive access, automated scripts and cron jobs, CI/CD pipelines using SSH for deployment, and backup systems using SSH/SFTP for data transfer. Document any compatibility issues encountered and develop remediation plans before production deployment.

Consider phased deployment strategies that minimize disruption. Deploy updated packages to a subset of systems first, monitor for authentication failures or unexpected behavior, and expand deployment progressively. Maintain rollback capability during initial deployment phases.

Implementation Recommendations

Pilot FIDO key deployment with administrator accounts and document provisioning workflows. Administrative access presents the highest value target for attackers, making hardware-backed authentication particularly valuable for these accounts. Develop procedures for security key provisioning, backup key enrollment, and lost key recovery before expanding to broader user populations.

Plan the ssh-rsa sunset by inventorying hosts and automation using RSA/SHA-1 keys. Schedule key regeneration or configuration updates to use rsa-sha2-256 or Ed25519 algorithms before the announced removal. Prioritize internet-facing systems and production infrastructure where authentication failures have the greatest business impact.

Update OpenSSH packages on servers and developer workstations to version 8.2 or vendor backports that include equivalent functionality. Confirm ssh_config and sshd_config align with organizational cipher, MAC, and key exchange policies. Monitor logs for authentication anomalies during and after the transition.

Long-term Security Strategy

OpenSSH 8.2 represents part of a broader industry movement toward hardware-backed authentication and deprecation of cryptographic algorithms with known weaknesses. If you are affected, establish processes for monitoring cryptographic developments and planning orderly transitions when algorithms are deprecated.

Consider the total cost of ownership for different authentication approaches. Hardware security keys have upfront procurement costs but may reduce incident response costs by preventing credential theft. Evaluate the security benefits against operational complexity and user experience impacts.

Integrate SSH authentication updates into broader identity and access management strategies. Hardware security keys that support FIDO2 can provide authentication for multiple services beyond SSH, potentially simplifying the overall authentication infrastructure while improving security across applications.

Continue in the Developer pillar

Return to the hub for curated research and deep-dive guides.

Visit pillar hub

Latest guides

Coverage intelligence

Published
Coverage pillar
Developer
Source credibility
90/100 — high confidence
Topics
OpenSSH 8.2 · FIDO2 · U2F · ssh-rsa · Secure Shell · hardware security
Sources cited
3 sources (openssh.com, lists.mindrot.org, fidoalliance.org)
Reading time
5 min

Cited sources

  1. OpenSSH 8.2 Release Notes — OpenBSD Project
  2. OpenSSH 8.2p1 Portable Release — OpenSSH Developers
  3. FIDO2 Specifications — FIDO Alliance
  • OpenSSH 8.2
  • FIDO2
  • U2F
  • ssh-rsa
  • Secure Shell
  • hardware security
Back to curated briefings

Comments

Community

We publish only high-quality, respectful contributions. Every submission is reviewed for clarity, sourcing, and safety before it appears here.

    Share your perspective

    Submissions showing "Awaiting moderation" are in review. Spam, low-effort posts, or unverifiable claims will be rejected. We verify submissions with the email you provide, and we never publish or sell that address.

    Verification

    Complete the CAPTCHA to submit.