<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Disable ssh host key in Operating System - Linux</title>
    <link>https://community.hpe.com/t5/operating-system-linux/disable-ssh-host-key/m-p/4596446#M40000</link>
    <description>Hi,&lt;BR /&gt;&lt;BR /&gt;if you want to use ssh from within a script, use this:&lt;BR /&gt;&lt;BR /&gt;# ssh -o BatchMode yes&lt;BR /&gt;&lt;BR /&gt;"The option BatchMode specifies whether a username and password querying on connect will be disabled. This option is useful when you create scripts and dont want to supply the password. e.g. Scripts that use the scp command to make backups over the network. "&lt;BR /&gt;&lt;BR /&gt;AFAIK in BatchMode that question won't appear, and the machine will be skipped.&lt;BR /&gt;&lt;BR /&gt;Regards,&lt;BR /&gt;Viktor</description>
    <pubDate>Tue, 09 Mar 2010 14:05:16 GMT</pubDate>
    <dc:creator>Viktor Balogh</dc:creator>
    <dc:date>2010-03-09T14:05:16Z</dc:date>
    <item>
      <title>Disable ssh host key</title>
      <link>https://community.hpe.com/t5/operating-system-linux/disable-ssh-host-key/m-p/4596440#M39994</link>
      <description>Hi All,&lt;BR /&gt;&lt;BR /&gt;I want to disable ssh authentication message.&lt;BR /&gt;If I do ssh to the 10.58.131.51 machine, I have to type "yes" first time before giving password.&lt;BR /&gt;&lt;BR /&gt;How can I avoid this?&lt;BR /&gt;&lt;BR /&gt;I have already configured passwordless ssh authentication.&lt;BR /&gt;&lt;BR /&gt;How can I avoid the following message ?&lt;BR /&gt;&lt;BR /&gt;The authenticity of host '10.58.131.51 (10.58.131.51)' can't be established.&lt;BR /&gt;RSA key fingerprint is 92:01:d7:e4:b0:69:8a:21:bd:ee:10:a2:39:35:7e:46.&lt;BR /&gt;Are you sure you want to continue connecting (yes/no)?&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Please help me in this regard. I am using RHEL 5.4 on an HP hardware and open ssh version is ssh 4.3p.</description>
      <pubDate>Mon, 08 Mar 2010 06:35:13 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/disable-ssh-host-key/m-p/4596440#M39994</guid>
      <dc:creator>WW288996</dc:creator>
      <dc:date>2010-03-08T06:35:13Z</dc:date>
    </item>
    <item>
      <title>Re: Disable ssh host key</title>
      <link>https://community.hpe.com/t5/operating-system-linux/disable-ssh-host-key/m-p/4596441#M39995</link>
      <description>When connecting for the first time, the new host key is not yet in the local ~/.ssh/known_hosts file. To get rid of the message You must somehow get the host key in that file before connecting. The "Tips" section at &lt;A href="http://www.securityfocus.com/infocus/1806" target="_blank"&gt;http://www.securityfocus.com/infocus/1806&lt;/A&gt; might have something useful. HTH.</description>
      <pubDate>Mon, 08 Mar 2010 07:08:45 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/disable-ssh-host-key/m-p/4596441#M39995</guid>
      <dc:creator>Modris Bremze</dc:creator>
      <dc:date>2010-03-08T07:08:45Z</dc:date>
    </item>
    <item>
      <title>Re: Disable ssh host key</title>
      <link>https://community.hpe.com/t5/operating-system-linux/disable-ssh-host-key/m-p/4596442#M39996</link>
      <description>our scripts want to avoid this message.</description>
      <pubDate>Mon, 08 Mar 2010 07:28:52 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/disable-ssh-host-key/m-p/4596442#M39996</guid>
      <dc:creator>WW288996</dc:creator>
      <dc:date>2010-03-08T07:28:52Z</dc:date>
    </item>
    <item>
      <title>Re: Disable ssh host key</title>
      <link>https://community.hpe.com/t5/operating-system-linux/disable-ssh-host-key/m-p/4596443#M39997</link>
      <description>Ideally, you should gather the host keys of all your SSH servers and store them to /etc/ssh/ssh_known_hosts on all hosts used as SSH clients. This way you will be both protected from man-in-the-middle attacks and offering maximum user convenience.&lt;BR /&gt;&lt;BR /&gt;The OpenSSH suite includes a ssh-keyscan tool to create this file quickly (run "man ssh-keyscan" to see documentation).&lt;BR /&gt;&lt;BR /&gt;If /etc/ssh/ssh_known_hosts does not exist or does not contain the public hostkey of the host you're connecting to, the SSH client will show you that message, then attempt to save the host key to $HOME/.ssh/known_hosts. If $HOME/.ssh is not writable by the user, this step is simply skipped and the message will be displayed again in the future.&lt;BR /&gt;&lt;BR /&gt;(NOTE: $HOME/.ssh should normally be owned by the user that's using it, and have drwx------ permissions. The directory must be protected from write access of other users, or else SSH will not use any files found in it.)&lt;BR /&gt;&lt;BR /&gt;If you really cannot have neither a centralised /etc/ssh/ssh_known_hosts file for all users nor a regular per-user $HOME/.ssh/known_hosts file, it is possible to set the StrictHostKeyChecking option to "no", although this is definitely not recommended because that configuration will allow an attacker to set up a proxy between you and the host you're connecting to without your noticing. Such a proxy would see all your SSH traffic unencrypted (it would decrypt everything it receives, then re-encrypt it for the real connection target).&lt;BR /&gt;&lt;BR /&gt;This option can be specified in the command line as "ssh -o StrictHostKeyChecking=no", or it can be configured in $HOME/.ssh/config or /etc/ssh/ssh_config as:&lt;BR /&gt;&lt;BR /&gt;StrictHostKeyChecking no&lt;BR /&gt;&lt;BR /&gt;MK</description>
      <pubDate>Mon, 08 Mar 2010 07:31:27 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/disable-ssh-host-key/m-p/4596443#M39997</guid>
      <dc:creator>Matti_Kurkela</dc:creator>
      <dc:date>2010-03-08T07:31:27Z</dc:date>
    </item>
    <item>
      <title>Re: Disable ssh host key</title>
      <link>https://community.hpe.com/t5/operating-system-linux/disable-ssh-host-key/m-p/4596444#M39998</link>
      <description>It really doesn't matter - if ssh is not asking You for confirmation, it will not ask "the script" and vice versa.</description>
      <pubDate>Mon, 08 Mar 2010 09:00:24 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/disable-ssh-host-key/m-p/4596444#M39998</guid>
      <dc:creator>Modris Bremze</dc:creator>
      <dc:date>2010-03-08T09:00:24Z</dc:date>
    </item>
    <item>
      <title>Re: Disable ssh host key</title>
      <link>https://community.hpe.com/t5/operating-system-linux/disable-ssh-host-key/m-p/4596445#M39999</link>
      <description>&lt;!--!*#--&gt;Hi,&lt;BR /&gt;&lt;BR /&gt;I haven't read the through the replies already given, so the answer most likely has been given already.&lt;BR /&gt;&lt;BR /&gt;Anyway, the reliance on your ssh client's security measures is totally up to the user's discretion, and can mostly be (deliberately) undermined (provided the remote ssh server permits this).&lt;BR /&gt;&lt;BR /&gt;E.g. here's what I often do when I have tunneled some port by local or remote port forwarding in advance.&lt;BR /&gt;&lt;BR /&gt;$ ssh -o userknownhostsfile=/dev/null -o stricthostkeychecking=no -p 2222 localhost ...&lt;BR /&gt;&lt;BR /&gt;If you want to supress any warning messages informing you that the host key has been added to user's known hosts file (which of course is /dev/null) simply add the -q option to the command.&lt;BR /&gt;&lt;BR /&gt;If you feel this is too much typing then edit your ~/.ssh/config file and put in some stanza like this (indentations and case are irrelevant):&lt;BR /&gt;&lt;BR /&gt;Host   inconsiderate&lt;BR /&gt;   HostName               1.2.3.4&lt;BR /&gt;   User                   somebody&lt;BR /&gt;   UserKnownHostsFile     /dev/null&lt;BR /&gt;   StrictHostkeyChecking  no&lt;BR /&gt;   LogLevel               quiet&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Then you can simply connect by &lt;BR /&gt;&lt;BR /&gt;$ ssh inconsiderate</description>
      <pubDate>Mon, 08 Mar 2010 09:56:45 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/disable-ssh-host-key/m-p/4596445#M39999</guid>
      <dc:creator>Ralph Grothe</dc:creator>
      <dc:date>2010-03-08T09:56:45Z</dc:date>
    </item>
    <item>
      <title>Re: Disable ssh host key</title>
      <link>https://community.hpe.com/t5/operating-system-linux/disable-ssh-host-key/m-p/4596446#M40000</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;if you want to use ssh from within a script, use this:&lt;BR /&gt;&lt;BR /&gt;# ssh -o BatchMode yes&lt;BR /&gt;&lt;BR /&gt;"The option BatchMode specifies whether a username and password querying on connect will be disabled. This option is useful when you create scripts and dont want to supply the password. e.g. Scripts that use the scp command to make backups over the network. "&lt;BR /&gt;&lt;BR /&gt;AFAIK in BatchMode that question won't appear, and the machine will be skipped.&lt;BR /&gt;&lt;BR /&gt;Regards,&lt;BR /&gt;Viktor</description>
      <pubDate>Tue, 09 Mar 2010 14:05:16 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/disable-ssh-host-key/m-p/4596446#M40000</guid>
      <dc:creator>Viktor Balogh</dc:creator>
      <dc:date>2010-03-09T14:05:16Z</dc:date>
    </item>
  </channel>
</rss>

