OpenSSH 8.5 released
OpenSSH 8.5 released
Posted Mar 3, 2021 18:13 UTC (Wed) by josh (subscriber, #17465)Parent article: OpenSSH 8.5 released
> benefits while making key rotation significantly more difficult,
> especially for hosts behind IP-based load-balancers.
I'm excited to see this change.
> * ssh(1): when prompting the user to accept a new hostkey, display
> any other host names/addresses already associated with the key.
And this one, though it could produce a massive amount of output in some cases.
Posted Mar 3, 2021 23:12 UTC (Wed)
by unixbhaskar (guest, #44758)
[Link]
This one would be really interesting!
Posted Mar 4, 2021 1:03 UTC (Thu)
by djm (subscriber, #11651)
[Link] (13 responses)
yeah, if this turns out to be a problem in practice then let us know and we'll add a limit.
Posted Mar 4, 2021 7:11 UTC (Thu)
by josh (subscriber, #17465)
[Link] (12 responses)
Posted Mar 4, 2021 10:36 UTC (Thu)
by johill (subscriber, #25196)
[Link]
Posted Mar 4, 2021 11:33 UTC (Thu)
by nye (subscriber, #51576)
[Link] (10 responses)
Posted Mar 4, 2021 11:37 UTC (Thu)
by Cyberax (✭ supporter ✭, #52523)
[Link] (2 responses)
Posted Mar 4, 2021 12:21 UTC (Thu)
by nye (subscriber, #51576)
[Link] (1 responses)
(And if they *are* reusing the same key, then you still won't end up with such a list unless you connect via a new throwaway DNS name for each one instead of using a fixed hostname or the unchanging IP address.)
Posted Mar 4, 2021 22:06 UTC (Thu)
by Cyberax (✭ supporter ✭, #52523)
[Link]
Posted Mar 4, 2021 16:16 UTC (Thu)
by josh (subscriber, #17465)
[Link] (5 responses)
Posted Mar 4, 2021 17:43 UTC (Thu)
by nye (subscriber, #51576)
[Link] (4 responses)
Posted Mar 4, 2021 22:06 UTC (Thu)
by josh (subscriber, #17465)
[Link] (3 responses)
Posted Mar 7, 2021 12:21 UTC (Sun)
by vadim (subscriber, #35271)
[Link] (2 responses)
Then you'll have a lot less of this happening, as each VM will end up using the same address virtually all the time.
Posted Mar 7, 2021 15:12 UTC (Sun)
by Cyberax (✭ supporter ✭, #52523)
[Link]
Posted Mar 8, 2021 0:22 UTC (Mon)
by josh (subscriber, #17465)
[Link]
Posted Mar 8, 2021 17:13 UTC (Mon)
by emmi3 (subscriber, #62443)
[Link]
The (cutomized) images are built using live-build form debian-live. Normally live-build would delete the ssh host key during build time and live-config would create a new ssh host key on every startup. This was undesirable since ssh would complain about the changed host key after every reboot of the thin client. Therefore I baked one predefined host key directly into the image.
The thin clients are connected to our university environment via wireguard using a 10-something private subnet. Thus we have nearly one hundred different physical hosts (with different but fixed IPs and hostnames) using the same ssh host key.
I don't see anything wrong with this setup and I think this is a valid use case. If my ssh client starts complaining about all those hosts having the same host key, I will have to start creating separate keys for every client and distributing them like I do with the wireguard preshared keys and other client specific data right now. No big deal, but I don't really see any benefit from this.
OpenSSH 8.5 released
> any other host names/addresses already associated with the key.
OpenSSH 8.5 released
OpenSSH 8.5 released
OpenSSH 8.5 released
OpenSSH 8.5 released
OpenSSH 8.5 released
OpenSSH 8.5 released
OpenSSH 8.5 released
OpenSSH 8.5 released
OpenSSH 8.5 released
OpenSSH 8.5 released
OpenSSH 8.5 released
OpenSSH 8.5 released
Then you'll run out of addresses, since VMs are disposable and each new VM gets a new MAC.
OpenSSH 8.5 released
My use case: one hundred systems with the same ssh host key
