This procedure is useful when a host interoperates with hosts that run v1 and v2.
Assume the Primary Administrator role, or become superuser.
The Primary Administrator role includes the Primary Administrator profile. To create the role and assign the role to a user, see Chapter 2, Working With the Solaris Management Console (Tasks), in System Administration Guide: Basic Administration.
Configure the host to use both Solaris Secure Shell protocols.
Edit the /etc/ssh/sshd_config file.
# Protocol 2 Protocol 2,1
Provide a separate file for the host key for v1.
Add a HostKey entry to the /etc/ssh/sshd_config file.
HostKey /etc/ssh/ssh_host_rsa_key HostKey /etc/ssh/ssh_host_dsa_key HostKey /etc/ssh/ssh_host_rsa1_key
Generate a host key for v1.
# ssh-keygen -t rsa1 -f /etc/ssh/ssh_host_rsa1_key -N ''
Indicates the RSA algorithm for v1.
Indicates the file that holds the host key.
Indicates that no passphrase is required.
Restart the sshd daemon.
# svcadm restart network/ssh:default
You can also reboot the system.