I work on debian with openssh 1:3.8.1p1-8.sarge.4 I am building an UserModeLinux machine for automated test purposes and copy the dsa and rsa files from /etc/ssh/ onto the uml (and set the permissions correctly). I also put my personal ssh public key into the uml's root dir during install. Now I get this warning when I connect to the uml from my host machine:
WARNING: DSA key found for host 10.0.2.2 in /home/andreas/.ssh/known_hosts:38 DSA key fingerprint e9:d7:8b:fa:79:70:8c:cf:05:c2:09:70:49:0c:3a:cd. The authenticity of host '10.0.2.2 (10.0.2.2)' can't be established but keys of different type are already known for this host. RSA key fingerprint is 95:10:a8:18:68:74:75:3a:db:33:0c:cd:18:e0:87:bf. I dont really understand what the problem might be. All four keys are there and fine after each uml install and identical with the originals (checked the sha1sum of them). do i need more files to make the uml machines appear identical after reinstall? ====================== for entertainment, this is how i handle the copying of the files: ome reason the user's homedir is a read only filesystem during # the rootstrap run. if [ ! -d $data ]; then mkdir $data fi if [ -f $data/ssh_host_rsa_key -a -f $data/ssh_host_rsa_key.pub ]; then cat $data/ssh_host_rsa_key | \ chroot $TARGET sh -c "cat > /etc/ssh/ssh_host_rsa_key" cat $data/ssh_host_rsa_key.pub | \ chroot $TARGET sh -c "cat > /etc/ssh/ssh_host_rsa_key.pub" chroot $TARGET chmod 600 /etc/ssh/ssh_host_rsa_key chroot $TARGET chmod 644 /etc/ssh/ssh_host_rsa_key.pub else chroot $TARGET cat /etc/ssh/ssh_host_rsa_key \ > $data/ssh_host_rsa_key chroot $TARGET cat /etc/ssh/ssh_host_rsa_key.pub \ > $data/ssh_host_rsa_key.pub fi if [ -f $data/ssh_host_dsa_key -a -f $data/ssh_host_dsa_key.pub ]; then cat $data/ssh_host_dsa_key | \ chroot $TARGET sh -c "cat > /etc/ssh/ssh_host_dsa_key" cat $data/ssh_host_dsa_key.pub | \ chroot $TARGET sh -c "cat > /etc/ssh/ssh_host_dsa_key.pub" chroot $TARGET chmod 600 /etc/ssh/ssh_host_dsa_key chroot $TARGET chmod 644 /etc/ssh/ssh_host_dsa_key.pub else chroot $TARGET cat /etc/ssh/ssh_host_dsa_key > $data/ssh_host_dsa_key chroot $TARGET cat /etc/ssh/ssh_host_dsa_key.pub > $data/ssh_host_dsa_key.pub fi if [ -f $home/.ssh/id_rsa.pub ]; then cat $home/.ssh/id_rsa.pub | chroot $TARGET sh -c "mkdir /root/.ssh; chmod 700 /root/.ssh; cat >> /root/.ssh/authorized_keys" fi if [ -f $home/.ssh/id_dsa.pub ]; then cat $home/.ssh/id_dsa.pub | chroot $TARGET sh -c "mkdir /root/.ssh; chmod 700 /root/.ssh; cat >> /root/.ssh/authorized_keys" fi
signature.asc
Description: Digital signature