I have confirmed that this is an issue for the latest daily Lucid AMI:
ami-5936db30
ubuntu-images-testing-us/ubuntu-lucid-daily-i386-server-20100113.manifest.xml
ubu...@domu-12-31-39-04-08-b2:~$ ssh-keygen -l -f /etc/ssh/ssh_host_rsa_key
2048 15:46:e4:66:e3:60:b8:89:fe:d3:65:aa:7a:77:4e:cd
/etc/ssh/ssh_host_rsa_key.pub (RSA)
ubu...@domu-12-31-39-04-08-65:~$ ssh-keygen -l -f /etc/ssh/ssh_host_rsa_key
2048 15:46:e4:66:e3:60:b8:89:fe:d3:65:aa:7a:77:4e:cd
/etc/ssh/ssh_host_rsa_key.pub (RSA)
I have confirmed that this is *not* an issue for the released Karmic
AMI:
ami-1515f67c
ubuntu-images-us/ubuntu-karmic-9.10-i386-server-20091027.1.manifest.xml
ubu...@domu-12-31-39-02-60-41:~$ ssh-keygen -l -f /etc/ssh/ssh_host_rsa_key
2048 33:d7:a2:7d:ba:96:b0:e3:d7:f2:2e:be:04:24:38:ed
/etc/ssh/ssh_host_rsa_key.pub (RSA)
ubu...@domu-12-31-39-02-61-24:~$ ssh-keygen -l -f /etc/ssh/ssh_host_rsa_key
2048 4e:e1:93:4c:31:9a:c8:f7:c7:f4:b0:6a:56:e1:97:78
/etc/ssh/ssh_host_rsa_key.pub (RSA)
I did not test the latest daily Karmic AMI, but that should be checked
before new Karmic AMIs are released.
I started the importance to "High" since this effectively makes ssh
unencrypted to a man in the middle which is a serious security issue for
people who care about security. (Yes, I realize that most users don't
check fingerprints on EC2, but it should at least be possible to be
secure.)
** Changed in: ec2-init (Ubuntu)
Status: New => Confirmed
** Changed in: ec2-init (Ubuntu)
Importance: Undecided => High
--
ssh keys not regenerated on first boot
https://bugs.launchpad.net/bugs/507070
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs