openssh update broke connectivity
Tony Baechler
tony at baechler.net
Wed Aug 19 09:42:36 UTC 2015
No, GPG isn't necessary and GPG keys are entirely different. As Sam already
said, generating new keys is probably not going to help. The only thing you
can do is try to re-enable those cyphers in ssh_config or write to them
explaining the problem. I thought I read in the release notes that the man
pages were updated, but I haven't upgraded here yet, partially for that very
reason. If you temporarily delete your public and private keys in .ssh on
the remote system, does it ask you for a password? If not, generating new
keys is a waste of time. The ssh public key has a .pub extension and is the
key you give out to any remote system where you wish to connect. The
private key is the key you don't give out to anyone and should only be on
your local system.
On 8/18/2015 7:51 AM, Jude DaShiell wrote:
>> From what I read in the release notes on openssh.com, dsa and rsa and a
> whole bunch of other ciphers were depricated. The ssh-keygen program and
> man page both need updating to reflect these changes. In the past, I had
> generated a key set then copied the key up using ssh-copy-id and I was able
> to log in after that with ssh. One thing I don't quite understand in the
> release notes is a public key (my guess is generated by gnupg) will be
> needed to use openssh at all. I hope not since gpg is its own drum of worms
> and it wasn't explained how to integrate the keys in those release notes
> either unless I heard the explanation and didn't understand it.
>
More information about the Blinux-list
mailing list