Solved

how to generate a rsa key on redhat - complatable with old systems

Posted on 2008-06-11
3
520 Views
Last Modified: 2013-12-21
I need to create a key that is compatible as far back as Solaris 2 which we still have in production.

I am using Redhat ( centos 5 actually :)

I am assuming that I need a simple passphrase, 1028 bits and RSA.

If I just run the ssh-keygen command I get a great secure key, so secure that I have problems with it ;(

I can look in the man page but it takes me so long to try keys and use it for a while to learn I it does not work with older systems.  If someone has suggestions, I can compare the suggestion to the man page.


0
Comment
Question by:itguy411
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 43

Accepted Solution

by:
ravenpl earned 250 total points
ID: 21766655
You need sshv1 key - yes?
ssh-keygen -b 1024 -t rsa1
0
 

Author Comment

by:itguy411
ID: 21771949
Ravenpl:
you earned the points however I as wondering if you would throw me a bone ?

If I create an RSA1 key, can I use it with newer servers that support RSA2 ?

0
 
LVL 43

Expert Comment

by:ravenpl
ID: 21772013
No. Unless the server support sshv1 as well(and configured to use it).
0

Featured Post

NEW Veeam Agent for Microsoft Windows

Backup and recover physical and cloud-based servers and workstations, as well as endpoint devices that belong to remote users. Avoid downtime and data loss quickly and easily for Windows-based physical or public cloud-based workloads!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

I. Introduction There's an interesting discussion going on now in an Experts Exchange Group — Attachments with no extension (http://www.experts-exchange.com/discussions/210281/Attachments-with-no-extension.html). This reminded me of questions tha…
It’s 2016. Password authentication should be dead — or at least close to dying. But, unfortunately, it has not traversed Quagga stage yet. Using password authentication is like laundering hotel guest linens with a washboard — it’s Passé.
Learn how to get help with Linux/Unix bash shell commands. Use help to read help documents for built in bash shell commands.: Use man to interface with the online reference manuals for shell commands.: Use man to search man pages for unknown command…
This demo shows you how to set up the containerized NetScaler CPX with NetScaler Management and Analytics System in a non-routable Mesos/Marathon environment for use with Micro-Services applications.

688 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question