Displaying 20 results from an estimated 3000 matches similar to: "Disabling host key checking on LAN"
2015 Aug 29
2
Disabling host key checking on LAN
On Fri, Aug 28, 2015 at 11:51 PM, Walter Carlson <wlcrls47 at gmail.com> wrote:
> On Thu, Aug 27, 2015 at 12:26 AM, Walter Carlson <wlcrls47 at gmail.com> wrote:
>
>> Perfect, thanks. This winds up working for me (as far as I've tested so
>> far.)
>>
>> Match exec "ping -q -c 1 -t 1 %n | grep '192\.168\.'"
>>
2015 Aug 27
3
Disabling host key checking on LAN
Perfect, thanks. This winds up working for me (as far as I've tested so
far.)
Match exec "ping -q -c 1 -t 1 %n | grep '192\.168\.'"
StrictHostKeyChecking no
UserKnownHostsFile none
On Wed, Aug 26, 2015 at 11:47 PM, Bostjan Skufca <bostjan at a2o.si> wrote:
> (+cc list)
>
> You could use something in the following manner:
>
> Match originalhost *
2015 Aug 30
2
Disabling host key checking on LAN
On Sun, Aug 30, 2015 at 6:57 AM, Bostjan Skufca <bostjan at a2o.si> wrote:
> Nico,
>
> those were my thoughts, exacly, except that I was thinking about using "dig
> +short HOST | ..." which has the cleanest output of all.
Excellent point. I like it! It can get a bit confusing with
round-robin DNS, which can give multiple responses.
> But there is that initial
2015 Aug 28
2
Disabling host key checking on LAN
On Fri, Aug 28, 2015 at 8:48 AM, Bostjan Skufca <bostjan at a2o.si> wrote:
> On 27 August 2015 at 05:01, Damien Miller <djm at mindrot.org> wrote:
>> Yeah, it's unfortunately quite difficult to implement address matching
>> in ~/.ssh/config because of the interplay of Host matching, Hostname
>> directives, hostname canonicalisation*, proxy commands, hosts
2016 Apr 09
5
Slow reading of large dovecot-uidlist files
Hi there,
(context: I was optimizing Roundcube mailbox list server response, and in
that 300-400ms response time, around 170ms is spent on single fgets() call
which is waiting IMAP repsonse to "SELECT MyMailbox" command)
I straced dovecot and of the whole request/response process, around 30ms is
spent for everything else, and overwhelming majority of time (150-170ms) is
spent for
2015 Aug 27
2
Disabling host key checking on LAN
On Thu, 27 Aug 2015, Bostjan Skufca wrote:
> Are you connecting by specifying "ssh HOSTNAME" instead of "ssh IP.IP.IP.IP"?
>
> If this is the case, then "Host 192.168.*.*" line never matches when
> you think it should.
>
> From ssh_config manpage:
> "The host is the hostname argument given on the command line (i.e. the
> name is not
2015 Jul 22
2
Keyboard Interactive Attack?
Thanks for clarification.
One question though:
As far as I have tested openssh, it logs every unsuccessful
authentication attempt on the very moment it becomes unsuccessful, not
after the connection is closed (after timeout or when reaching max
auth attempts). Is this true or not even for this attack or not?
Because if it is true, if there is a IDS system that bans IP after X
failed logins,
2015 Jul 22
7
Keyboard Interactive Attack?
I read an article today about keyboard interactive auth allowing bruteforcing.
I'm afraid I have minimal understanding of what keyboard-interactive really does. What does it do, and should I have my clients set it to off in sshd_config?
---
Scott Neugroschl | XYPRO Technology Corporation
4100 Guardian Street | Suite 100 |Simi Valley, CA 93063 | Phone 805 583-2874|Fax 805 583-0124 |
2020 Oct 04
2
UpdateHostkeys now enabled by default
On Sun, 4 Oct 2020, Christoph Anton Mitterer wrote:
> On Sun, 2020-10-04 at 14:02 +1100, Damien Miller wrote:
> > This is strictly no worse than continuing to use the old key, so I
> > don't consider it a problem.
>
> Well but in reality it will lead to people never again replace their
> key by proper means.
Well, first I disagree that this method is improper. The
2011 Aug 29
1
Auth forwarding socket for single auth
Hi all,
authentication forwarding depends much on the environment it is used
in, but generally on shared hosts it is considered insecure, as this
documentation and common sense tell us:
http://unixwiz.net/techtips/ssh-agent-forwarding.html
Anyway, I have an auth forwarding security enhancement proposal. I
hope I am not duplicating someone else's words/thoughts, please notify
me if this is
2013 May 14
2
[Bug 1993] ssh tries to add keys to ~/.ssh/known_hosts though StrictHostKeyChecking yes is set
https://bugzilla.mindrot.org/show_bug.cgi?id=1993
alex at testcore.net changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |alex at testcore.net
Version|5.9p1 |6.2p1
--- Comment #1 from alex at testcore.net ---
Also
2024 Feb 17
1
How to remove old entries from known_hosts?
Brian Candler wrote:
> Chris Green wrote:
> > ... redundant ones are because I have a mixed population of
> > Raspberry Pis and such on my LAN and they get rebuilt fairly
> > frequently and thus, each time, get a new entry in known_hosts.
> ...many useful tips...
> To disable host key checking altogether for certain domains and/or networks,
> you can put this in
2011 Apr 08
1
Host selection in ssh_config
Hello there,
I'm a little afraid of writing here, hope I don't make any mistake doing
so. I'm trying for days and searching the web too, but no obvious
solution, no reply from the specialized forum I wrote in.
Here is the situation:
I would like to have a lighter security inside our domain, without
changing when going outside. By "lighter security" I mean at least, no
2017 Jan 28
3
known_hosts question for Ubuntu Server 14.04 and 16.04 LTS
Hello & thanks for reading.
I'm having a problem configuring known_hosts from scripts so an accept
key yes/no prompt doesn't appear.
I'm using this command to detect if the server is known and add it to
known_hosts:
if ! ssh-keygen -F ${IP_ADDR} -f ~/.ssh/known_hosts > /dev/null 2>&1; t
hen ssh-keyscan -p ${PORT} ${IP_ADDR} >> ~/.ssh/known_hosts; fi
This works
2009 Jun 29
3
SSH Authenticity Messages... Disable/
Greetings CentOS community!
I connect to a very large number of new machines with a handful of my CentOS boxen. Whenever I connect to a new host, I *REALLY* would like to *NOT* see the error message such as this:
The authenticity of host 'w.x.y.z (w.x.y.z)' can't be established.
RSA key fingerprint is 62:7a:6c:e5:03:f5:47:be:23:a5:c5:e5:c3:60:9b:8d.
Are you sure you want to continue
2024 Oct 18
1
SSH host key rotation – known_hosts file not updated
On 2024-10-17 19:26, Nico Kadel-Garcia wrote:
> > Thank you! Increasing the verbosity revealed a known_hosts entry linked
> > to serverA's IP address (I had forgotten that I had connected to it by
> > IP address at some point). Deleting this entry solved the problem; the
> > new host key was stored in known_hosts when I connected to serverA
> > again.
> >
2002 Feb 19
2
hostkey checking
Hi!
Is it somehow possible to disable the known_hosts checking for some hosts?
The StrictHostKeyChecking affects only the asking about new computers, but
doesn't affect the changed ones.
I need it for the test computers, which are reinstalled twice/hour and
I really don't like editing .ssh/known_hosts each time :-(
Thanks
Michal
2013 Apr 04
2
AuthorizedKeysCommand question
Hi,
is there a particular reason why this feature is "user" based and not
"user-pubkey" based?
What I mean is that it works for installation with small number of pubkeys
per user.
But imagine i.e. a GitHub scale - all users logging in as user "git". On
each auth request all the keys from database would be fetched and feeded to
OpenSSH.
Now I am only asking this out
2020 Sep 29
12
Human readable .ssh/known_hosts?
Hi list members,
just tried to get some old records out of my known_hosts, which is 'HashKnownHosts yes'. Is there a way to unhash host names and/or IPs?
Google tells about, how to add hosts, but not the opposite, may be I miss some thing.
Is this does not work at all, is there a best practice for cleaning old hosts and keys out?
Thanks, Martin!
--
Martin
GnuPG Key Fingerprint, KeyID
2024 Oct 17
2
Re: Re: SSH host key rotation – known_hosts file not updated
On Mon, Oct 14, 2024 at 5:33?AM Jan Eden via openssh-unix-dev
<openssh-unix-dev at mindrot.org> wrote:
redacted hostname and port ? sorry, should have mentioned that.
>
> > Anyway, in answer to your question. The "host key found matching a different
> > name/address" is triggered when a key received from the server in an update
> > already exists under a