Debian has published a recent security advisory regarding a documented weakeness in the Debian openssl key generation procedure:<br><br> <a target="_top" rel="nofollow" href="http://news.gmane.org/find-root.php?message_id=%3c87od7az9v4.fsf%5f%5f2780.18743633783%241210681384%24gmane%24org%40mid.deneb.enyo.de%3e">[DSA 1571-1] New openssl packages fix predictable random number generator</a><br>
<br><a href="http://article.gmane.org/gmane.linux.debian.security.announce/1614">http://article.gmane.org/gmane.linux.debian.security.announce/1614</a><br><br>Accordingly we are changing the host keys on all Ubuntu and Debian systems. Users should be prepared to accept the new host keys.<br>
<br>Additionally, ALL USERS MUST generate new private/public keypairs using the patched ssl-keygen or equivalent (such as putty-keygen) and replace the public key in their ~/.ssh/authorized_keys file. This applies to users with accounts on crank, pedal, teach, grinch and all other Debian or Ubuntu boxes. <br>
<br>If you need help, please open a ticket by emailing <a href="mailto:sysadmin@laptop.org">sysadmin@laptop.org</a> with your new pub key or a link to it. Please specify which machines on which you have accounts in the message.<br>
<br>thanks,<br><br>--HH.<br>