1. Security and the Linux service

For security reasons it is not possible to use telnet and standard ftp to access the Linux service. Instead you must use secure access, which ensures that traffic (especially passwords) is encrypted. Client programs are available for most computer platforms and installation and use of some of them is described in the client section.

Please note that following a security advisory regarding a weakness in cryptographic key generation issued on 13th May 2008, the SSH keys and therefore the key fingerprints were changed. You may need to explicitly permit your ssh client to connect to the ssh server after verifying the fingerprints. When accessing the shell service, you should verify the SSH fingerprints presented by your client against the following:

          RSA1 2048 42:a4:91:3e:4c:d6:37:d9:2c:92:f8:63:8e:8e:d1:44
          RSA 2048 12:05:75:ee:73:a7:6d:3d:27:f3:fd:32:c7:5d:9b:09
          DSA 1024 83:62:92:01:52:c6:d1:ed:f4:99:40:6a:e8:2f:95:e2
        

or if you are using the commercial SSH client:

          RSA1 2048 xilof-gikil-guvut-kisan-memyl-vikec-lahap-fabuv-rudil-hakic-gixax
          RSA 2048 xuden-sisas-kidum-dikul-socol-lepiv-gutyn-kizob-darif-zuset-tuxux
          DSA 1024 xenar-parit-lebud-bihyg-dopof-tudad-saryv-capal-kinug-musup-vixux
        

N.B. You can copy files to and from the system using scp or Secure FTP; implementations of SCP and SFTP are included with PuTTY and with SSH Secure Shell (see clients section for details).

Up: Contents Next: 2. Client software to access the Linux service