Difference between revisions of "Openssh client: Invalid key length"
Jump to navigation
Jump to search
Tags: Mobile web edit, Mobile edit |
Tags: Mobile web edit, Mobile edit |
||
(3 intermediate revisions by the same user not shown) | |||
Line 1: | Line 1: | ||
− | Error message from [[Openssh]] client when connecting to a Cisco router: | + | Error message from [[Openssh]] client when connecting to a [[Cisco]] router/switch: |
[[ssh_dispatch_run_fatal]]: Connection to 10.10.10.4 port 22: [[Invalid key length]] | [[ssh_dispatch_run_fatal]]: Connection to 10.10.10.4 port 22: [[Invalid key length]] | ||
− | Solution: | + | Solution, execute in [[Cisco IOS]]: |
[[crypto key zeroize rsa]] | [[crypto key zeroize rsa]] | ||
[[crypto key generate rsa modulus 2048]] | [[crypto key generate rsa modulus 2048]] | ||
Line 8: | Line 8: | ||
[[OpenSSH 7.6]] (October 2017) | [[OpenSSH 7.6]] (October 2017) | ||
− | * Refuse [[keys]] <1024 bits in length and improve reporting for keys that do not meet this requirement. | + | * Refuse [[keys length]] <1024 bits in length and improve reporting for keys that do not meet this requirement. |
Line 18: | Line 18: | ||
[[Category:ssh]] | [[Category:ssh]] | ||
+ | [[Category:IOS]] |
Latest revision as of 06:12, 18 September 2021
Error message from Openssh client when connecting to a Cisco router/switch:
ssh_dispatch_run_fatal: Connection to 10.10.10.4 port 22: Invalid key length
Solution, execute in Cisco IOS:
crypto key zeroize rsa crypto key generate rsa modulus 2048
OpenSSH 7.6 (October 2017)
- Refuse keys length <1024 bits in length and improve reporting for keys that do not meet this requirement.
Related terms[edit]
See also[edit]
- SSH:
ssh
, TLS,.ppk, .pem, .crt, .pub
, ED25519, Key exchange method (KEX), public key, private key,ssh -Q kex
,IAMUserSSHKeys
,known_hosts
, ssh tunnel, Dropbear
Advertising: