IC SunsetThe developerWorks Connections platform will be sunset on December 31, 2019. On January 1, 2020, this blog will no longer be available. More details available on our FAQ.

Comments (6)
  • Add a Comment
  • Edit
  • More Actions v
  • Quarantine this Entry

Comments (6)

ZlatkoAIX commented Feb 25 2015 Comment Permalink

Preserving the keys is good when it comes to prevent disruption, and the workaround will do. However it is also important to take into account why the key replacement was added in OpenSSH 5.8. The replacement was driven by two factors: a) weaknesses in the keys by using pseudo-random sources with unsufficient enthropy, and b) potential unauthorised access to host keys. Both vulnerabilities compromise the security of the encrypted connection, and key preservation will keep the servers exposed.

sk@ commented Sep 8 2012 Comment Permalink

Chris, whats your thought , this procedure may vary if use different vendor ssh production in 5.3 and moving to open ssh in 7.1 ? ta

cggibbo commented Aug 23 2012 Comment Permalink

Oh yeah, /etc/motd is also over written.

cggibbo commented Aug 23 2012 Comment Permalink

Hi Anthony and Dave, thanks for the comments. The wiki sounds like a great idea. We've got a decent list of tips and tricks already.

dxtans commented Aug 23 2012 Comment Permalink

Chris, And tcp wrappers gets over written, well the hosts.allow/deny files inetd.conf and snmpd.conf gets over written. Good call on work around for SSH, bit of a bummer with sshd_confif, as my config file is heavily populated with chroot directives and allowed groups, fortunately I took local backups of my config files, so quickly got back to normal. DT

AnthonyEnglish commented Aug 22 2012 Comment Permalink

Chris, Maybe we should put together a developerWorks wiki on gotchas for migrations to AIX 7.1. So far, before the migration, check: ssh keys revert to default tuning parameters remove MPIO filesets save sendmail config aixpert save XML files After the migration: install MPIO filesets Replace Kerberos entry KRB5A in /usr/lib/security/methods.cfg with KRB5. Anthony