On XXX, the SSH server software on the aidan time-sharing service will be upgraded to OpenSSH. Unfortunately OpenSSH and the existing software (provided by SSH.com) do not have a compatible way of storing key-pairs. Therefore, existing connection arrangements that use public-key authentication will stop working.
If you have not setup public-key authentication for connections to aidan, then you are not affected by this change.
With SSH, it is possible to setup a pair of keys that allow you to log into an SSH server without typing a password. To find out more about public-key authentication, please visit XXX
OpenSSH will read the file
.ssh/authorized_keys
for public key
fingerprints that it will accept. If you have existing
keys on your client, you may need to convert them to a
format understood by OpenSSH.
You can use the ssh-keygen
tool
distributed with OpenSSH (and available on the time
sharing servers) to convert between file types as
described in the document Getting OpenSSH to work with ssh.com and itself.
You can also use the PuttyGen tool on windows machines.
First ensure that a directory .ssh
exists:
test ! -d ~/.ssh && mkdir ~/.sshNow you can convert the file
key.pub
into
a fingerprint and append it to the
authorized_keys
file:
ssh-keygen -if key.pub >> ~/.ssh/authorized_keysTODO: what mechanism for creating keys exists in the ssh.com software on the common desktop? RESULTS: ssh2 only; RSA or DSA; 2048 default length; ssh.com format; upload feature specific to ssh.com server
The OpenSSH server software is currently running on aidan but on port 802. You can therefore test your SSH software connecting to this port now, in order to check that any new key arrangement works.