Displaying 7 results from an estimated 7 matches for "ssh_host_".
Did you mean:
ssh_host
2010 Mar 29
18
please decrypt your manuals
I. most of ssh manual and all sshd manual present server and client as one machine, called host. All files mentioned are placed on one machine. This is incorrect, and makes the explanation unclear. For example, man sshd SSH_KNOWN_HOSTS FILE FORMAT suggests to copy keys from /etc/ssh/ssh_host_key.pub into /etc/ssh/ssh_known_hosts, as if those files are on the same machine.
II. a general presentation of ssh workings is missing, and makes the decryption of those manuals even more difficult. i suppose, but i am not sure that:
both encrypt their messages with the encryption keys in:
/et...
2007 May 05
2
ssh to failover target?
I have some machines that send ssh commands to a load balancer appliance
that is really a pair of machines that can fail over to each other. The
ssh keys are set up on both targets, but whenever the active target is
changed, ssh issues a warning about a "man-in-the-middle" attack also
goes to the log and the console which tends to alarm the operators.
Setting the strict host check
2013 Nov 25
6
[PATCH/RFC OSSTEST] Debian PV netboot guest test
...l tasksel/first multiselect standard
+
+d-i pkgsel/include string openssh-server, ntp, ntpdate
+
+d-i finish-install/reboot_in_progress note
+
+
+END
+#$xopts{ExtraPreseed}
+
+ my $authkeys= authorized_keys();
+
+ my $hostkeyfile= "$c{OverlayLocal}/etc/ssh/ssh_host_rsa_key";
+ my $host_rsa_key= get_filecontents($hostkeyfile);
+ chomp($host_rsa_key); $host_rsa_key.="\n";
+
+ preseed_hook_command($ho, ''late_command'', $sfx, <<END);
+#!/bin/sh
+set -ex
+
+r=/target/root
+cd \$r
+
+umask 022
+mkdir .ssh
+cat <<&...
2011 Feb 21
1
[PATCH/cygwin]: Revised sshh-host-config script
...IR=/var
-source ${CSIH_SCRIPT}
-
port_number=22
privsep_configured=no
privsep_used=yes
@@ -46,29 +71,48 @@ opt_force=no
# Routine: create_host_keys
# ======================================================================
create_host_keys() {
+ local ret=0
+
if [ ! -f "${SYSCONFDIR}/ssh_host_key" ]
then
csih_inform "Generating ${SYSCONFDIR}/ssh_host_key"
- ssh-keygen -t rsa1 -f ${SYSCONFDIR}/ssh_host_key -N '' > /dev/null
+ if ! /usr/bin/ssh-keygen -t rsa1 -f ${SYSCONFDIR}/ssh_host_key -N '' > /dev/null
+ then
+ csih_warning &quo...
2010 Jun 06
19
Collecting _all_ ssh keys
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Hello,
I read and find a way (well, there seems to be several equal
implementations) to collect the ssh keys of machines. However they all
give only the choice to choose between the key formats.
But is there a way to collect both keys of a machine, the rsa _and_ the
dss key (and maybe the rsa1 too)? I didn''t find a way to solve this as
2016 Apr 28
4
Centos hold me back from work - sshd ...bull
ine-imac-andy:~ andy$ ssh 141.52.135.21
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
@ WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED! @
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
IT IS POSSIBLE THAT SOMEONE IS DOING SOMETHING NASTY!
Someone could be eavesdropping on you right now (man-in-the-middle attack)!
It is also possible that a host key has just been
2002 Dec 20
3
Bad packet length problem with "aes128-cbc" and openssh3.1p1
...3.1p1. But it is giving "Bad packet length" error
when I run sshd with default config file. On further investigation I found
that the error is coming only for the cipher algorithm "aes128-cbc". Also
the error comes only when I don't specify any protocol file
(/usr/local/etc/ssh_host_[rd]sa_key) or specify only "protocol 2" files.
I tried all other cipher algorithms with the "-c" option and it works fine
with them. I also changed the sshd config file (/usr/local/etc/sshd_config
in my case), and it again worked fine when "aes128-cbc" was not include...