Winelfred G. Pasamba wrote:
how can one make ssh host keys consistent over machines in an HA cluster?
the problem is when the secondary takes over clients get the ssh warning (middle man attack something)
afaik, you shouldn't considering the security implications.
man-in-the-middle attack is usually in the form of IP hijacking which HA also uses.
-- Philippine Linux Users' Group (PLUG) Mailing List [EMAIL PROTECTED] (#PLUG @ irc.free.net.ph) Official Website: http://plug.linux.org.ph Searchable Archives: http://marc.free.net.ph . To leave, go to http://lists.q-linux.com/mailman/listinfo/plug . Are you a Linux newbie? To join the newbie list, go to http://lists.q-linux.com/mailman/listinfo/ph-linux-newbie
