On 20150417_1408-0500, David Wright wrote: > Quoting Paul E Condon (pecon...@mesanetworks.net): > > > I have four desktop machines running Jessie. I try to keep them a;; > > upgraded on whenever new package versions are released. I thought it > > would be fast and simple. I was very wrong. This install behaves very > > differently in the following way: When I attempt to ssh into one of > > the computers that was not re-installed, I get a complaint that: > > > > @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ > > @ WARNING: POSSIBLE DNS SPOOFING DETECTED! @ > > @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ > > The RSA host key for gq has changed, > > and the key for the corresponding IP address 192.168.1.12 > > is unknown. This could either mean that > > DNS SPOOFING is happening or the IP address for the host > > and its host key have changed at the same time. > > This I do not receive, perhaps because my router knows my MAC and > gives me my static IP number. > > > @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ > > @ WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED! @ > > @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ > > IT IS POSSIBLE THAT SOMEONE IS DOING SOMETHING NASTY! > > Someone could be eavesdropping on you right now (man-in-the-middle attack)! > > It is also possible that a host key has just been changed. > > The fingerprint for the RSA key sent by the remote host is > > 51:cf:52:87:6f:13:43:50:73:29:2c:b4:34:11:cd:5c. > > Please contact your system administrator. > > Add correct host key in /home/pec/.ssh/known_hosts to get rid of this > > message. > > Offending RSA key in /etc/ssh/ssh_known_hosts:3 > > remove with: ssh-keygen -f "/etc/ssh/ssh_known_hosts" -R gq > > RSA host key for gq has changed and you have requested strict checking. > > Host key verification failed. > > This one is very familiar, and is something I wanted to avoid when > installing via ssh and network-console. > > You're presumably running ssh as pec. What I'm not sure about is why > you're using /etc/ssh/ssh_known_hosts rather than > /home/pec/.ssh/known_hosts , because you need root to maintain the > former. > > > I get this same complaint even after I remove the known_hosts file > > entirely. How can the software retain the information that the offending > > line is the third line? It must be doing more than the documentation > > that I have says its doing, > > There are potentially two files. "the known_hosts file" implies you've > deleted one of them. > > > This is a home lan. I use a hosts file to > > inform the several computers of the IP addresses of all the computers in > > the LAN. The file is identical on all computers and hasn't changed sine > > etch. > > Same here. The router doesn't have a resolver, so I type hostnames and > hosts gives me the static IP numbers. > > > In the past, I was given the option of typing the login password of the > > computer that I want to log into, but not now. > > I'm not sure why you call it an "option". The default is to require > typing a password (of the user, not the computer), and we avoid that > by giving the remote host a "question" (our public key, placed it its > authorized_keys file) to which only we know the "answer" (our private > key, in our id_rsa file). > > > I don't understand what I should do with the RSA 'fingerprint' doesn't > > look at all like a legitimate line in a known_host file. How is it used? > > On the odd occasion that I keep the newly-installed host keys (usually > when I notice a new type of key in /etc/ssh/) I type, for example, > $ ssh-keygen -l -v -f /etc/ssh/ssh_host_ecdsa_key.pub > .../ssh-fingerprint > where ... is the place you keep your configuration records. > That's the remote hosts's fingerprint you check when you get the > warning. (I don't know how to get a host to send the randomart.) > > > Where is the source of this occult knowledge? > > man ssh-keygen is your friend. > > > Why does the author of the WARNING presume that there is a different > > person, other than the person reading the message who is the actual > > 'your system administration'? Has someone in NSA or CIA been assigned > > to monitor me, and this message breaches global security because I > > should not be allowed to know that I am being watch? > > Because if you were logging in to your unix account at work, say, > you'd pick up the phone and ask the operators what in h*ll's name are > they up to! In other words, ssh assumes the remote host really is > remote. You (local) get the warning, but the host that might have been > compromised (if it's not man-in-the-middle) is the remote one. > > Cheers, > David.
Thanks, David I'm replying here to your post that was earlier than one that I have already replied to. It is 4:30am for me, and I woke up way before I usually do and couldn't go back to sleep. Now after about an hour of wakefulness, I'm beginning to need more sleep. I haven't pieced together all your comments in logical order because their order was driven by the order to statements in my meandering description. This email will, I hope, place our exchange of emails back in sync. But we shall see if I can maintain this brief flash of rationality. The current situation is for the hardware is not what is was when you wrote, but if I write about it now it will confuse the situation more. Cheers, -- Paul E Condon pecon...@mesanetworks.net -- To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org Archive: https://lists.debian.org/20150418105715.ga2...@big.lan.gnu