SSH DSS Keys Dont Work

I add HostKeyAlgorithms +ssh-rsa,ssh-dss to /etc/ssh/ssh_config
and after using ssh I see
/etc/ssh/ssh_config line 50: Bad key types ‘+ssh-dss’.
/etc/ssh/ssh_config: terminating, 1 bad configuration options

In Mintlinux XFCE this algorithm works well but I put it on sshd_config. Here sshd_config does not react in any way to this line.-Unable to negotiate with xxx.xxx.xxx.xxx port 22: no matching host key type found. Their offer: ssh-rsa,ssh-dss

https://archlinux.org/news/openssh-70p1-deprecates-ssh-dss-keys/

This was already in 2015. Not sure what Mint is doing here.

If you want, I can go to Mint and show that this line works there.I use it to ssh-connect to a server on CentOS 6

It doesnt matter what Mint is doing. In Arch, since 2015, dss keys are deprecated.

I have to be more precise: DSS keys are deprecated upstream:

https://lists.mindrot.org/pipermail/openssh-unix-announce/2015-August/000122.html

Thank you. So I’ll work on Mint Linux uname -a
Linux pal 5.15.0-116-generic #126-Ubuntu SMP Mon Jul 1 10:14:24 UTC 2024 x86_64

Please keep in mind that DSS keys have been deprecated for a reason (security vulnerabilties). It is very easy to create new keys. Why dont you just do that?

Because I need to communicate with a server on SentOS 6 that only works with this algorithm

This server on СentOS6 manages a computing cluster that has been running for 12 years continuously without switching off, and rebuilding a computing cluster with calculation data for 12 years is a big hassle.

It seems that arch isn’t the way to go then, because arch doesn’t support that anymore.

As far as I know Centos6 also supports RSA keys.

You could try enabling secure SSH key exchange and MAC algorithms on the server. If you have the option to connect to the server any other way, look at the supported algorithms and configure the sshd to support one of those.