Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 27 Jul 2001 18:24:33 +0300
From:      Peter Pentchev <roam@orbitel.bg>
To:        "Karsten W. Rohrbach" <karsten@rohrbach.de>
Cc:        Scott Johnson <sjohn@airlinksys.com>, freebsd-security@freebsd.org
Subject:   Re: ssh_host_dsa_key fingerprint
Message-ID:  <20010727182433.A1105@ringworld.oblivion.bg>
In-Reply-To: <20010727170448.I23159@mail.webmonster.de>; from karsten@rohrbach.de on Fri, Jul 27, 2001 at 05:04:48PM %2B0200
References:  <20010727011647.A69806@sjohn.airlinksys.com> <20010727170448.I23159@mail.webmonster.de>

next in thread | previous in thread | raw e-mail | index | archive | help
On Fri, Jul 27, 2001 at 05:04:48PM +0200, Karsten W. Rohrbach wrote:
> Scott Johnson(sjohn@airlinksys.com)@2001.07.27 01:16:47 +0000:
> > If you're like me and wondered how to get a fingerprint for your DSA host
> > key: start ssh-agent, add the host key, and list your keys.
> > 
> > If you don't care or already figured out a way, disregard this message.
> > :-)
> 
> man ssh-keygen(1):
> 
> -l      Show fingerprint of specified private or public key file.

Does this work for DSA though?

[root@ringworld:v3 ~]# ssh-keygen -lf /etc/ssh/ssh_host_dsa_key
/etc/ssh/ssh_host_dsa_key is not a valid key file.
[root@ringworld:v3 ~]# ssh-keygen -lf /etc/ssh/ssh_host_key
1024 fc:1f:cf:8c:5c:dc:10:d7:80:21:a3:cc:3b:b2:9f:9d root@ringworld.office1.bg
[root@ringworld:v3 ~]#

Seems to work OK for the RSA host key..
This is on a -stable rebuilt today:

[root@ringworld:v3 ~]# ssh -V
SSH Version OpenSSH_2.3.0 green@FreeBSD.org 20010321, protocol versions 1.5/2.0.
Compiled with SSL (0x0090601f).

G'luck,
Peter

-- 
When you are not looking at it, this sentence is in Spanish.

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20010727182433.A1105>