]>
Commit | Line | Data |
---|---|---|
43ac0186 | 1 | OpenSSH is almost completely compatible with the commercial SSH 1.2.x. |
2 | There are, however, a few exceptions that you will need to bear in | |
3 | mind while upgrading: | |
4 | ||
5 | 1. OpenSSH does not support any patented transport algorithms. | |
6 | ||
7 | Only 3DES and Blowfish can be selected. This difference may manifest | |
8 | itself in the ssh command refusing to read its config files. | |
9 | ||
10 | Solution: Edit /etc/ssh/ssh_config and select a different "Cipher" | |
11 | option ("3des" or "blowfish"). | |
12 | ||
13 | 2. Old versions of commercial SSH encrypt host keys with IDEA | |
14 | ||
15 | The old versions of SSH used a patented algorithm to encrypt their | |
16 | /etc/ssh/ssh_host_key | |
17 | ||
18 | This problem will manifest as sshd not being able to read its host | |
19 | key. | |
20 | ||
21 | Solution: You will need to run the *commercial* version of ssh-keygen | |
22 | on the host's private key: | |
23 | ||
24 | ssh-keygen -u /etc/ssh/ssh_host_key | |
25 | ||
26 | 3. Incompatible changes to sshd_config format. | |
27 | ||
28 | OpenSSH extends the sshd_config file format in a number of ways. There | |
29 | is currently one change which is incompatible with the old. | |
30 | ||
31 | Commercial SSH controlled logging using the "QuietMode" and | |
32 | "FascistLogging" directives. OpenSSH introduces a more general set of | |
33 | logging options "SyslogFacility" and "LogLevel". See the sshd manual | |
34 | page for details. | |
35 | ||
3dbefdb8 | 36 | 4. Warning messages about key lengths |
37 | ||
38 | Commercial SSH's ssh-keygen program contained a bug which caused it to | |
39 | occasionally generate RSA keys which had their Most Significant Bit | |
40 | (MSB) unset. Such keys were advertised as being full-length, but are | |
41 | actually only half as secure. | |
42 | ||
43 | OpenSSH will print warning messages when it encounters such keys. To | |
44 | rid yourself of these message, edit you known_hosts files and replace | |
45 | the incorrect key length (usually "1024") with the correct key length | |
46 | (usually "1023"). | |
47 | ||
20c43d8c | 48 | 5. Spurious PAM authentication messages in logfiles |
49 | ||
50 | OpenSSH will generate spurious authentication failures at every login, | |
51 | similar to "authentication failure; (uid=0) -> root for sshd service". | |
52 | These are generated because OpenSSH first tries to determine whether a | |
53 | user needs authentication to login (e.g. empty password). Unfortunatly | |
54 | PAM likes to log all authentication events, this one included. | |
55 | ||
36a5b38e | 56 | If it annoys you too much, set "PermitEmptyPasswords no" in |
57 | sshd_config. This will quiet the error message at the expense of | |
58 | disabling logins to accounts with no password set. |