For security reasons it is not possible to use telnet and standard ftp to access the Linux service. Instead you must use secure access, which ensures that traffic (especially passwords) is encrypted. Client programs are available for most computer platforms and installation and use of some of them is described in the client section.
Following a security advisory regarding a weakness in cryptographic key generation issued on 13th May 2008, the SSH keys and therefore the key fingerprints were changed. You may need to explicitly permit your ssh client to connect to the ssh server after verifying the fingerprints. When accessing the shell service, you should verify the SSH fingerprints presented by your client against the following:
DSA 1024 83:62:92:01:52:c6:d1:ed:f4:99:40:6a:e8:2f:95:e2
RSA 2048 12:05:75:ee:73:a7:6d:3d:27:f3:fd:32:c7:5d:9b:09
ECDSA 256 c9:cc:85:b3:e0:97:5e:32:11:cc:c5:b2:50:0f:80:f5
ED25519 256 e8:ac:bc:7b:6f:aa:e4:8d:61:85:1c:a5:3a:88:d9:74
or if you are using a more recent ssh client that makes use of SHA256 encoded fingerprints (note, some clients drop the "=" padding character off the end):
or if you are using the commercial SSH client:
DSA 1024 xenar-parit-lebud-bihyg-dopof-tudad-saryv-capal-kinug-musup-vixux
RSA 2048 xuden-sisas-kidum-dikul-socol-lepiv-gutyn-kizob-darif-zuset-tuxux
N.B. You can copy files to and from the system using scp or Secure FTP; implementations of SCP and SFTP are included with PuTTY and with SSH Secure Shell.