, that which can be adequately explained by
stupidity
- Hanlon's Razor
Original Message
Subject: Re: Cloning SSH keys
From: r.stricklin b...@typewritten.org
Date: Mon, July 16, 2012 9:24 pm
To: LINUX-390@VM.MARIST.EDU
On Jul 16, 2012, at 8:03 AM, Lee Stewart wrote:
I'd never
I'd never thought about it before, but a customer pointed out that when
you clone a system, each Linux clone has the same Host RSA key
fingerprint as it's master. I can't think of anything that would cause
a problem with. On the other hand, if they wanted to regenerate the
keys, does it take
On Mon, 16 Jul 2012 09:03:09 -0600
Lee Stewart lstewart.dsgr...@attglobal.net wrote:
I'd never thought about it before, but a customer pointed out that when
you clone a system, each Linux clone has the same Host RSA key
fingerprint as it's master. I can't think of anything that would cause
Only if your post-cloning process does not include generating new RSA keys.
It's all in how you set up your cloning process, and the planning you've put
into it.
--
Robert P. Nix Mayo Foundation.~.
RO-OC-1-18 200 First Street SW/V\
507-284-0844
And the solution is simple:
rm /etc/ssh/*key*
service sshd restart
I set my golden image to have no SSH keys before cloning. One step less to
make the clones ready.
Em 16/07/2012 11:23, Alan Cox a...@lxorguk.ukuu.org.uk escreveu:
On Mon, 16 Jul 2012 09:03:09 -0600
Lee Stewart
I'd even go beyond what Alan said, since I don't treat any system or network as
trusted. Deleting the keys on the source system should be all you need to do
for new clones. Deleting them from the existing guests and restarting sshd will
be enough for the rest. People who have already accessed
On Jul 16, 2012, at 8:03 AM, Lee Stewart wrote:
I'd never thought about it before, but a customer pointed out that when
you clone a system, each Linux clone has the same Host RSA key
fingerprint as it's master. I can't think of anything that would cause
a problem with. On the other hand,