Hi,
this might be a stupid question but I did not find a quick answer
by a google search or by reading the ssh faq:
At the first ssh login the user is presented a fingerprint, e.g.
DSA key fingerprint is df:c2:72:01:ee:0d:05:f9:a1:4f:de:56:a7:48:bd:90
I tried to figure out how to gather these
## Thomas Gebhardt ([EMAIL PROTECTED]):
I tried to figure out how to gather these fingerprints from
a bunch of servers. Obviously ssh-keyscan can be used to collect
the public keys, but is there an easy way to calculate the
fingerprints?
$ ssh-keygen -l -f ssh_host_dsa_key.pub
$ 1024
Hi,
$ ssh-keygen -l -f ssh_host_dsa_key.pub
$ 1024 97:46:de:e0:a1:71:76:6f:b6:e8:f1:40:2a:63:bc:18 ssh_host_dsa_key.pub
HTH,
yes :-)
So I had missed two points:
1. ssh-keygen does more than generate keys.
2. the fingerprints are generated from the secret keys, not from the
public keys.
## Thomas Gebhardt ([EMAIL PROTECTED]):
$ ssh-keygen -l -f ssh_host_dsa_key.pub
$ 1024 97:46:de:e0:a1:71:76:6f:b6:e8:f1:40:2a:63:bc:18 ssh_host_dsa_key.pub
2. the fingerprints are generated from the secret keys, not from the
public keys.
No, they are generated from the public keys.
As
4 matches
Mail list logo