Shouldn't be anything big.  I didn't even notice I had OpenSSH 2.9 
until a couple days after the fact.  Of course, that's with rebuilding
the whole system that OpenSSH is designed on.  

The crypto developers at OpenBSD/OpenSSH haven't considered key
servers secure enough, at least not enough to publish any code to
implement one :)
 
SSH2 tries publickey first, and if that fails, password authentication
is tried.  Failing that, "keyboard-interactive" authentication is
attemped.

There are, however, a few differences in the key files between SSH1
and SSH2.  In the ~/.ssh directory:
known_hosts -> SSH1
known_hosts2 -> SSH2
identity & identity.pub -> SSH1
id_dsa & id_dsa.pub -> SSH2
id_rsa & id_rsa.pub -> SSH2

To create a SSH2 private/public key pair -> ssh-keygen -t [dsa|rsa]
You can use either dsa or rsa keys.

An issue you may encounter is with older SSH1.x only implementations,
but you can set what protocol you're using in the sshd_config file:
Protocol 2,1
would try to load a HostKey for protocol 2 (SSH2), and failing that
would try for the SSH1 HostKey.  There's also new names for the
SSH2 HostKey -> ssh_host_dsa_key & ssh_host_rsa_key.

You can also force protocols on the command line -> ssh -1 # SSH1
or in ssh_config files -> Protocol 1 # also SSH1. 

<[EMAIL PROTECTED]>

On Wed, May 09, 2001 at 10:37:11PM -0700, Rob Hudson wrote:
> Are there any gotchas to upgrading from 2.5x to 2.9 OpenSSH?  It was
> pretty well announced that the default is SSH2 now.  Are there any
> issues with trying to use SSH2?  I'm not sure, but is a public key
> server required?
> 
> Thanks,
> Rob
> 

Reply via email to