| Summary: | Accept host key fingerprint as the same as 'yes' | ||
|---|---|---|---|
| Product: | Portable OpenSSH | Reporter: | micah |
| Component: | ssh | Assignee: | Assigned to nobody <unassigned-bugs> |
| Status: | CLOSED FIXED | ||
| Severity: | enhancement | CC: | djm, dkg, jjelen |
| Priority: | P5 | ||
| Version: | 6.9p1 | ||
| Hardware: | Other | ||
| OS: | Linux | ||
|
Description
micah
2015-11-10 15:42:22 AEDT
I really like this idea. I was thinking about this step many times, but this solution seems really elegant, if there is no CA or SSHFP. The best thing is always to get the whole public key you can store by hand in your known_hosts. But having only fingerpint makes it more difficult and this feature would basically solve it. This would allow us to leave both methods available (yes/no checking or pasted fingerprint). It would be also helpful for the new fingerprint methods using SHA256 and base64, which is even harder to read and compare. > The authenticity of host 'somehost (10.0.0.1)' can't be established. ECDSA key fingerprint is SHA256:9hT+deeJW3NzlzBXvJ3eK/lr7QYmxaZweHqzPG2WASU. > Are you sure you want to continue connecting (yes/no)? > Or you can verify the fingerprint by writing it here: | It would also solve the issue with different hashes which can be problem at the moment, when connecting with new client (6.8+) to old machine (as described in bug #2439). The texts would probably needs a bit tweaking, but yes, the concept sounds great. I also like this idea. If you have the host key or its fingerprint already available, you should be able to just add it to your known_hosts file *before* you connect to the machine, but that's not a realistic workflow for most people. So Micah's suggestion is a good one that i think integrates well with common workflows. This feature has been available since openssh-8.0 closing resolved bugs as of 8.6p1 release |