Date: 04 Jan 2001 16:34:15 -0500 From: Lowell Gilbert <lowell@world.std.com> To: freebsd-questions@freebsd.org Subject: Re: fingerprint of ssh host pubic key? Message-ID: <44pui3f1d4.fsf@lowellg.ne.mediaone.net> In-Reply-To: dkelly@hiwaay.net's message of "4 Jan 2001 17:46:07 %2B0100" References: <dkelly@HiWAAY.net> <20010104104535.B20623@grumpy.dyndns.org>
next in thread | previous in thread | raw e-mail | index | archive | help
dkelly@hiwaay.net (David Kelly) writes: > On Wed, Jan 03, 2001 at 10:32:20PM -0800, Dima Dorfman wrote: > > The second word is what the ssh client displays when you first connect > > to somthing. Obviously, the above command assumes that your ssh host > > key lives in /etc/ssh (which is the default). > > Ah! Wonderful! That's exactly want I wanted. Works pretty good on > ~/.ssh/known-hosts too. > > Now to study the man page for ssh-keygen to see if I can understand > why I couldn't figure that out for myself. I don't know, but I've never used that approach anyway. I *have* sometimes used an offline method (floppies) for actually moving the public keys from one machine to another, when I wanted to feel safe from an impersonation attack. If you're dealing with a lot of machines, using fingerprints will save you a *lot* of time. - Lowell To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-questions" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?44pui3f1d4.fsf>