SSH server default configuration changes
For the AL2023 AMI, we changed the types of sshd
host keys that we generate
with the release. We also dropped some legacy key types to avoid generating them at launch
time. Clients must support the rsa-sha2-256
and rsa-sha2-512
protocols or ssh-ed25519
with use of an ed25519
key. By default,
ssh-rsa
signatures are disabled.
Additionally, AL2023 configuration settings in the default sshd_config
file
contain UseDNS=no
. This new setting means that DNS impairments are
less likely to block your ability to establish ssh
sessions with your instances.
The tradeoff is that the
from=
line entries in your hostname.domain
,hostname.domain
authorized_keys
files won't be resolved. Because
sshd
no longer attempts to resolve the DNS names, each comma separated
value must be translated to a
corresponding IP address.hostname.domain
For more information, see Default SSH server configuration.