[Bug 3113] StrictHostKeyChecking=no works with changed 1024 bit RSA hostkeys but fails when 2048 RSA

bugzilla-daemon at mindrot.org bugzilla-daemon at mindrot.org
Fri Apr 17 14:49:04 AEST 2020


https://bugzilla.mindrot.org/show_bug.cgi?id=3113

Damien Miller <djm at mindrot.org> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
             Status|NEW                         |RESOLVED
         Resolution|---                         |WORKSFORME

--- Comment #3 from Damien Miller <djm at mindrot.org> ---
This is the intended behaviour. StrictHostKeyChecking controls whether
ssh accepts a *new* hostkey automatically. It is not intended to
disable host key checking entirely.

I'd generally recommend against doing that, because an on-path attacker
can trivially MITM your connections. If you really want to do this,
then the easiest way is to pass "-oUserKnownHostsFile=/dev/null
-oStrictHostKeyChecking=no" to ssh.

-- 
You are receiving this mail because:
You are watching someone on the CC list of the bug.
You are watching the assignee of the bug.


More information about the openssh-bugs mailing list