frakman1

Community Developer
  • Posts

    169
  • Joined

  • Last visited

Report Comments posted by frakman1

  1. Is there a workaround that doesn't involve having to generate a new key? I'd like to continue using the same key I have on the various different machines that I connect from.

     

    I just upgraded from 6.9.2 to 6.10.3 and can no longer ssh into my Unraid server from my MacBook Air  (High Sierra)

    I realize that the algorithm I use is outdated (2048 SHA256). My pub key in the Users->root>SSH authorized keys starts with ssh-rsa. I changed the ending comment to read root@Tower where Tower is the hostname of the Unraid server as the comments above suggested but it still doesn't work.

     

    I tried this: (since -oPubkeyAcceptedAlgorithms was not recognized on my system) (tower is set to my IP address in /etc/hosts)

    ssh -oHostKeyAlgorithms=+ssh-rsa -oPubkeyAcceptedKeyTypes=+ssh-rsa root@tower
    ssh_exchange_identification: Connection closed by remote host

     

    I tried changing sshd_config on the server to include these options based on some post I saw online:

     

    RSAAuthentication yes
    PubkeyAuthentication yes
    HostKeyAlgorithms=ssh-rsa,[email protected]
    PubkeyAcceptedAlgorithms=+ssh-rsa,[email protected]

     

    in /boot/config/ssh/sshd_config and restarted the ssh server using /etc/rc.d/rc.sshd restart

    But that didn't work.

     

    I then found that ssh'ing from my modern M1 MacBook Pro (ventura) worked. I then reverted all my server changes including the comment at the end of the public key. ssh still worked from my new MacBok Pro. I also confirmed that it works from my Ubuntu 18 machine.

     

    Is there anything I can do to enable SSH from my old MacBook Air on High Sierra (macOS 10.13.6)?