1. Security and the Linux service
For security reasons it is not possible to use telnet and standard ftp to access the Linux service. Instead you must use secure access, which ensures that traffic (especially passwords) is encrypted. Client programs are available for most computer platforms and installation and use of some of them is described in the client section.
Please note that following a security advisory regarding a weakness in cryptographic key generation issued on 13th May 2008, the SSH keys and therefore the key fingerprints were changed. You may need to explicitly permit your ssh client to connect to the ssh server after verifying the fingerprints. When accessing the shell service, you should verify the SSH fingerprints presented by your client against the following:
RSA1 2048 42:a4:91:3e:4c:d6:37:d9:2c:92:f8:63:8e:8e:d1:44 RSA 2048 12:05:75:ee:73:a7:6d:3d:27:f3:fd:32:c7:5d:9b:09 DSA 1024 83:62:92:01:52:c6:d1:ed:f4:99:40:6a:e8:2f:95:e2
RSA1 2048 xilof-gikil-guvut-kisan-memyl-vikec-lahap-fabuv-rudil-hakic-gixax RSA 2048 xuden-sisas-kidum-dikul-socol-lepiv-gutyn-kizob-darif-zuset-tuxux DSA 1024 xenar-parit-lebud-bihyg-dopof-tudad-saryv-capal-kinug-musup-vixux
N.B. You can copy files to and from the system using
Secure FTP; implementations of SCP and SFTP are included with PuTTY
and with SSH Secure Shell (see clients section for