From owner-freebsd-questions Wed Jan 3 21:52:26 2001 From owner-freebsd-questions@FreeBSD.ORG Wed Jan 3 21:52:23 2001 Return-Path: Delivered-To: freebsd-questions@freebsd.org Received: from grumpy.dyndns.org (user-24-214-56-41.knology.net [24.214.56.41]) by hub.freebsd.org (Postfix) with ESMTP id 445E537B400 for ; Wed, 3 Jan 2001 21:52:23 -0800 (PST) Received: from localhost (localhost [127.0.0.1]) by grumpy.dyndns.org (8.11.1/8.11.1) with ESMTP id f045qMp18059 for ; Wed, 3 Jan 2001 23:52:22 -0600 (CST) (envelope-from dkelly@grumpy.dyndns.org) Message-Id: <200101040552.f045qMp18059@grumpy.dyndns.org> X-Mailer: exmh version 2.2 06/23/2000 with nmh-1.0.4 To: freebsd-questions@freebsd.org Subject: fingerprint of ssh host pubic key? From: David Kelly Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Date: Wed, 03 Jan 2001 23:52:22 -0600 Sender: dkelly@grumpy.dyndns.org Sender: owner-freebsd-questions@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.ORG When connecting via ssh to a host for the first time, ssh has the gaul to ask me if an "RSA key fingerprint ..." is correct. Well, duh, how am I supposed to know? I think I'm connecting to my own machine. Just how might I determine the fingerprint in advance? And the other part of this is if I provide ssh connection for somebody else I'd like to tell them in advance what the fingerprint is that they should expect to see. Its a bit easier than handing the entire public key. -- David Kelly N4HHE, dkelly@hiwaay.net ===================================================================== The human mind ordinarily operates at only ten percent of its capacity -- the rest is overhead for the operating system. To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-questions" in the body of the message