ssl_fingerprint
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
ssl_fingerprint [2016/05/06 06:26] – luke7858 | ssl_fingerprint [2024/05/23 07:26] (current) – external edit 127.0.0.1 | ||
---|---|---|---|
Line 11: | Line 11: | ||
This could be due to OS re-installs, | This could be due to OS re-installs, | ||
\\ | \\ | ||
- | However this could also mean that the machine you are connecting to is different. If you are sshing to a domain then the server behind the domain may have changed, or you could be targeted by a main-in-the-middle attack where the attacker somehow intercepts/ | + | __**WARNING**__: |
\\ | \\ | ||
\\ | \\ | ||
Line 18: | Line 18: | ||
/ | / | ||
</ | </ | ||
+ | \\ | ||
+ | \\ | ||
+ | == Connecting to a devicee == | ||
+ | When sshing to a device for the first time you will see something similar to: | ||
+ | <sxh bash> | ||
+ | The authenticity of host ' | ||
+ | RSA key fingerprint is 59: | ||
+ | Are you sure you want to continue connecting (yes/ | ||
+ | </ | ||
+ | This ' | ||
+ | \\ | ||
+ | \\ | ||
+ | \\ | ||
+ | Now its worth noting, if you are very strict about security then it would be worth retrieving the following information BEFORE sshing to the device for the first time. To prevent accidental exposing your username and password to an unknown device. | ||
+ | \\ | ||
+ | \\ | ||
+ | If you wish to obtain the fingerprint before connecting to a device then you should ask the owner of the other server to run the following command and send you the output before you connect: | ||
+ | <sxh bash> | ||
+ | cd /etc/ssh | ||
+ | for file in *sa_key.pub | ||
+ | do | ||
+ | done | ||
+ | </ | ||
+ | Ouput should be similar: | ||
+ | <sxh bash> | ||
+ | 1024 df: | ||
+ | 2048 59: | ||
+ | </ | ||
+ | You can now compare the two when first sshing to the device. | ||
+ | \\ | ||
+ | |||
+ | \\ | ||
+ | == .ssh/ | ||
+ | Your server stores a FULL copy of the target devices public key in the file known_hosts, | ||
+ | \\ | ||
+ | The fingerprint hash is for the use of humans so that its easier to compare fingerprints rather than trying to compare full private keys quickly. | ||
+ | \\ | ||
+ | Know hosts output for an ip looks similar to: | ||
+ | <sxh bash> | ||
+ | x.x.x.x ssh-rsa AAAAB3NzaC1ycHJLJASLK@KSAABAQCwYykFF8PXobqCVGHOiLGxqDIa6m4ka7MHbLr | ||
+ | 9IyL9SAZw9mnod2YZN311mGSGSoNww1XByZS7+PFzTbkd/ | ||
+ | cZ+ybuEJrwUMN+8gg9Il+IvJ6yz4zv7Xb84o4PuGZSkXvC9L+LlNDDfehnjLbzfBgHJAkhjAsjlkj; | ||
+ | +F79g bjSCI6X4zvxNmaqyY9/ | ||
+ | tTppE4vlEuni0fHKHASJljsadljklasdJKHnuAxjAz | ||
+ | </ | ||
+ | \\ | ||
+ | \\ | ||
+ | == Fingerprint Changed == | ||
+ | Below is an example output when a devices public key has changed. If you receive the following warning and you believe the target device has NOT been re-installed/ | ||
+ | <sxh bash> | ||
+ | @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ | ||
+ | @ WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED! | ||
+ | @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ | ||
+ | IT IS POSSIBLE THAT SOMEONE IS DOING SOMETHING NASTY! | ||
+ | Someone could be eavesdropping on you right now (man-in-the-middle attack)! | ||
+ | It is also possible that the RSA host key has just been changed. | ||
+ | The fingerprint for the RSA key sent by the remote host is | ||
+ | 2b: | ||
+ | Please contact your system administrator. | ||
+ | The authenticity of host ' | ||
+ | RSA key fingerprint is 6a: | ||
+ | Are you sure you want to continue connecting (yes/ | ||
+ | </ | ||
+ | \\ | ||
+ | == ssh-keygen == | ||
+ | ^ Flag ^ Explanation ^ | ||
+ | | -l | Show fingerprint of specified public key file. Private RSA1 keys are also supported. \\ For RSA and DSA keys ssh-keygen tries to find the matching public key file and prints its fingerprint | | ||
+ | | -f | file name | | ||
+ | \\ | ||
\\ | \\ | ||
\\ | \\ |
ssl_fingerprint.1462516000.txt.gz · Last modified: 2024/05/23 07:26 (external edit)