Skip site navigation (1)Skip section navigation (2)
Date:      04 Jan 2001 16:34:15 -0500
From:      Lowell Gilbert <lowell@world.std.com>
To:        freebsd-questions@freebsd.org
Subject:   Re: fingerprint of ssh host pubic key?
Message-ID:  <44pui3f1d4.fsf@lowellg.ne.mediaone.net>
In-Reply-To: dkelly@hiwaay.net's message of "4 Jan 2001 17:46:07 %2B0100"
References:  <dkelly@HiWAAY.net> <20010104104535.B20623@grumpy.dyndns.org>

next in thread | previous in thread | raw e-mail | index | archive | help
dkelly@hiwaay.net (David Kelly) writes:

> On Wed, Jan 03, 2001 at 10:32:20PM -0800, Dima Dorfman wrote:

> > The second word is what the ssh client displays when you first connect
> > to somthing.  Obviously, the above command assumes that your ssh host
> > key lives in /etc/ssh (which is the default).
> 
> Ah! Wonderful! That's exactly want I wanted. Works pretty good on
> ~/.ssh/known-hosts too.
> 
> Now to study the man page for ssh-keygen to see if I can understand
> why I couldn't figure that out for myself.

I don't know, but I've never used that approach anyway.  I *have*
sometimes used an offline method (floppies) for actually moving the
public keys from one machine to another, when I wanted to feel safe
from an impersonation attack.

If you're dealing with a lot of machines, using fingerprints will save
you a *lot* of time.

 - Lowell


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-questions" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?44pui3f1d4.fsf>