CURC's CILogin docs point to examples of creating ssh keys that are rsa. It appears that newer versions of openssh are phasing out rsa keys and therefore will not accept them by default. Recommend we modify our docs to point to examples that generate ed25519 keys.
Affected pages:
https://curc.readthedocs.io/en/latest/additional-resources/registrycilogon-instructions.html
https://curc.readthedocs.io/en/latest/additional-resources/amc_ssh_auth.html
It may also be worth helping people troubleshoot how to overcome this issue (i.e., if they use an rsa key):
Host *
HostkeyAlgorithms +ssh-rsa
PubkeyAcceptedAlgorithms +ssh-rsa
CURC's CILogin docs point to examples of creating ssh keys that are
rsa. It appears that newer versions of openssh are phasing out rsa keys and therefore will not accept them by default. Recommend we modify our docs to point to examples that generate ed25519 keys.Affected pages:
https://curc.readthedocs.io/en/latest/additional-resources/registrycilogon-instructions.html
https://curc.readthedocs.io/en/latest/additional-resources/amc_ssh_auth.html
It may also be worth helping people troubleshoot how to overcome this issue (i.e., if they use an
rsakey):Host * HostkeyAlgorithms +ssh-rsa PubkeyAcceptedAlgorithms +ssh-rsa