I've now created keys based on rsa with PuttyGen and these work OK. Even after upgrading back to the 1.0.1r version.
I think that the new algorithms like ecdsa are probably better. So I will generate the keys for the Windows clients on the Slackware side using the ssh-keygen tool. And then distribute the client side private keys to the clients. I have 4 Slackware machines (desktop, 2x NAS, router/webserver) and 3 windows clients so not too much work.
Still I find it strange that my dsa keys no longer work. When restarting SSHD the host keys for dsa are generated normally. All documentation still mentions DSA as a valid option.
Edit:
Just updated my desktop slackware to 1.0.1r and restarted sshd. For this machine the root login is still working OK eventhough the PermitRootLogin=yes is hashed out. Also the dsa key from the windows machine is still accepted.
I do have multilib installed on both machines. Could this have any influence?
Code:
[ Status ] [ Repository ] [ Package ]
installed openssl-1.0.1r-x86_64-1_slack14.1
installed openssl-solibs-1.0.1r-x86_64-1_slack14.1
uninstalled alienbob pyopenssl-0.11-x86_64-1alien
installed multilib openssl-solibs-compat32-1.0.1q-x86_64-1_slack14.1compat32
installed multilib openssl-compat32-1.0.1q-x86_64-1_slack14.1compat32
The multilib version of openssl is still on q