Prevent users from using the CVE-2008-0166 keys
<!--IssueSummary start--> <details> <summary> Everyone can contribute. [Help move this issue forward](https://handbook.gitlab.com/handbook/marketing/developer-relations/contributor-success/community-contributors-workflows/#contributor-links) while earning points, leveling up and collecting rewards. </summary> - [Close this issue](https://contributors.gitlab.com/manage-issue?action=close&projectId=278964&issueIid=365288) </details> <!--IssueSummary end--> <!-- This template is a great use for issues that are feature::additions or technical tasks for larger issues.--> ### Proposal Following https://gitlab.com/gitlab-org/gitlab/-/issues/24614 we now have the pieces in place to block known compromised SSH keys. https://github.com/g0tmi1k/debian-ssh contains 32 767 keys that should be avoided because they were generated with a version of OpenSSL that contained a bug (CVE-2008-0166). We've seen users use those keys in the past (see https://gitlab.com/gitlab-com/gl-security/security-operations/sirt/operations/-/issues/899, confidential issue) and currently don't prevent them from being used again. <!-- Consider adding related issues and epics to this issue. You can also reference the Feature Proposal Template (https://gitlab.com/gitlab-org/gitlab/-/blob/master/.gitlab/issue_templates/Feature%20proposal%20-%20detailed.md) for additional details to consider adding to this issue. Additionally, as a data oriented organization, when your feature exits planning breakdown, consider adding the `What does success look like, and how can we measure that?` section. --> <!-- Label reminders Use the following resources to find the appropriate labels: - https://gitlab.com/gitlab-org/gitlab/-/labels - https://about.gitlab.com/handbook/product/categories/features/ -->
issue