David Brown wrote:
> On Sat, Aug 16, 2008 at 04:38:34PM -0700, James G. Sack (jim) wrote:
> 
>> Is there some way to totally ignore hostkey for certain hosts?
> 
> Not easily, and it is fairly important from a security point of view
> that you don't do this.
> 
> There is a simple solution, copy the same host key to all of the
> multi-boot images that the machine uses.  Then, they will each get the
> same key.  Just look for the /etc/ssh/ssh_host* files.
> 
> It is also possible to put the multiple hosts keys in your
> ~/.ssh/known_hosts, just have the multiple lines naming the same host.
> 
> The old ssh protocol wasn't nearly as strict about checking this, and
> it is _trivial_ to inject a man-in-the middle attack on an ssh 1
> connection.
> 
> Without knowing who you are talking to, the encryption of the
> connection is pointless.
> 

I actually know all that (and agree).  My scenario is that I want to use
ssh as a better rsh, and transport tunnel for other apps -- in this case
entirely within my LAN. I would even be happy to turn off encryption.

I also thought of synchronizing the machine hostnames (which seems like
the most appropriate answer), but was looking for a lazier solution. ;-)
I didn't think of the suggestion of multiple entries in known_hosts, but
I think I'll skip that, as it is even more work. ;-)

I suppose the bottom line is I'm trying to use the tool for a different
purpose than intended. OK, fair 'nuff.

Regards,
..jim


-- 
KPLUG-List@kernel-panic.org
http://www.kernel-panic.org/cgi-bin/mailman/listinfo/kplug-list

Reply via email to