++added:
Verifying host fingerprints --------------------------- If you get a warning about a fingerprint change, you can check the host fingerprint your stored with:: ssh-keygen -l -f ~/.ssh/known_hosts | grep cvs.sv.gnu.org 1024 80:5a:b0:0c:ec:93:66:29:49:7e:04:2b:fd:ba:2c:d5 cvs.sv.gnu.org or if your known_hosts file is hashed:: $ ssh-keygen -F cvs.sv.gnu.org > tmpkey $ ssh-keygen -l -f tmpkey 1024 80:5a:b0:0c:ec:93:66:29:49:7e:04:2b:fd:ba:2c:d5 |1|/PZ6wITZ4GG+4XtGUy1FgzqaH8M=|uci92Jr08MGVxZAeofx2JHS/lfw= To verify the keys currently in use at Savannah:: $ ssh-keyscan -t rsa,dsa cvs.sv.gnu.org > tmpkey # cvs.sv.gnu.org SSH-2.0-OpenSSH_4.3p2 Debian-9 # cvs.sv.gnu.org SSH-2.0-OpenSSH_4.3p2 Debian-9 $ ssh-keygen -l -f tmpkey 1024 4d:c8:dc:9a:99:96:ae:cc:ce:d3:2b:b0:a3:a4:95:a5 cvs.sv.gnu.org 1024 80:5a:b0:0c:ec:93:66:29:49:7e:04:2b:fd:ba:2c:d5 cvs.sv.gnu.org On the server-side (for Savannah Hackers):: [EMAIL PROTECTED]:/# ssh-keygen -l -f /etc/ssh/ssh_host_rsa_key 1024 80:5a:b0:0c:ec:93:66:29:49:7e:04:2b:fd:ba:2c:d5 /etc/ssh/ssh_host_rsa_key.pub [EMAIL PROTECTED]:/# ssh-keygen -l -f /etc/ssh/ssh_host_dsa_key 1024 4d:c8:dc:9a:99:96:ae:cc:ce:d3:2b:b0:a3:a4:95:a5 /etc/ssh/ssh_host_dsa_key.pub -- forwarded from https://savannah.gnu.org/maintenance/[EMAIL PROTECTED]://savannah.gnu.org/maintenance _______________________________________________ Savannah-cvs mailing list [email protected] http://lists.gnu.org/mailman/listinfo/savannah-cvs
