| OpenSSH is almost completely compatible with the commercial SSH 1.2.x. |
| There are, however, a few exceptions that you will need to bear in |
| mind while upgrading: |
| |
| 1. OpenSSH does not support any patented transport algorithms. |
| |
| Only 3DES and Blowfish can be selected. This difference may manifest |
| itself in the ssh command refusing to read its config files. |
| |
| Solution: Edit /etc/ssh/ssh_config and select a different "Cipher" |
| option ("3des" or "blowfish"). |
| |
| 2. Old versions of commercial SSH encrypt host keys with IDEA |
| |
| The old versions of SSH used a patented algorithm to encrypt their |
| /etc/ssh/ssh_host_key |
| |
| This problem will manifest as sshd not being able to read its host |
| key. |
| |
| Solution: You will need to run the *commercial* version of ssh-keygen |
| on the host's private key: |
| |
| ssh-keygen -u /etc/ssh/ssh_host_key |
| |
| 3. Incompatible changes to sshd_config format. |
| |
| OpenSSH extends the sshd_config file format in a number of ways. There |
| is currently one change which is incompatible with the old. |
| |
| Commercial SSH controlled logging using the "QuietMode" and |
| "FascistLogging" directives. OpenSSH introduces a more general set of |
| logging options "SyslogFacility" and "LogLevel". See the sshd manual |
| page for details. |
| |
| 4. Warning messages about key lengths |
| |
| Commercial SSH's ssh-keygen program contained a bug which caused it to |
| occasionally generate RSA keys which had their Most Significant Bit |
| (MSB) unset. Such keys were advertised as being full-length, but are |
| actually only half as secure. |
| |
| OpenSSH will print warning messages when it encounters such keys. To |
| rid yourself of these message, edit you known_hosts files and replace |
| the incorrect key length (usually "1024") with the correct key length |
| (usually "1023"). |
| |