do.Most are probably using RSA. Since the NSA and other intels were in on the RSA diluting so that it could be more easily broken, it would seem wise that all remailers switch to Curve25519 (ECC) keys to access their servers. This is not difficult to
After the 25519 login is working, you need to delete the AES pub key from the authorized_keys file or an AES attack can still be performed.Use PUTTYGEN.EXE that comes in the Putty folder.
1. Check the EC25519 button at the bottom.
2. Click Generate.
3. Save public key. Save private key.
4. Point to the new private key in Putty.exe under Connection/SSH/Auth/Private key file for identification:
5. Add the newly generated public key into the /root/.ssh/authorized_keys file on the server.
5. Login
Already done here. I would suggest that you backup the server first and then duplicate your Putty AES login session and then modify the new session with the new key. Then you can fall back on your AES login if the 25519 doesn't work for some reason.
Sysop: | Keyop |
---|---|
Location: | Huddersfield, West Yorkshire, UK |
Users: | 296 |
Nodes: | 16 (2 / 14) |
Uptime: | 45:46:41 |
Calls: | 6,648 |
Files: | 12,197 |
Messages: | 5,329,775 |