I have some old 6.x FreeBSD systems that need their OpenSSH upgraded.

Everything goes just fine, but when I am done, existing clients are now 
presented with this message:


WARNING: DSA key found for host hostname
in /root/.ssh/known_hosts:12
DSA key fingerprint 4c:29:4b:6e:b8:6b:fa:49.......

The authenticity of host 'hostname (10.1.2.3)' can't be established
but keys of different type are already known for this host.
RSA key fingerprint is a3:22:3d:cf:f2:46:09:f2......
Are you sure you want to continue connecting (yes/no)


And as you can imagine, existing automated jobs now all fail.

I have no control over the clients.  Assume the clients cannot be touched at 
all.

So, the good news is, this appears to have been discussed/documented here:

http://www.mail-archive.com/bugs@crater.dragonflybsd.org/msg04860.html

... but I'm afraid that changing that line in myproposal.h BACK TO 
ssh-dss,ssh-rsa does not solve the problem.  I did indeed make that change to 
myproposal.h, manually, and then build the openssh-portable port, but the 
behavior persists.

If I simply REMOVE the RSA keys, the error goes away, and existing DSA-using 
clients no longer bomb out, but this is NOT a good solution for two reasons:

1. anytime I HUP, or start sshd, it's going to create new RSA keys for me

2. It's possible that some clients out there really have been using RSA all 
along (who knows) and now they are completely broken, since RSA is not there at 
all.

I'm more than happy to muck around in the source with further little edits, 
just like I did with myproposal.h, but I have no idea what they would be.

Can anyone help me "make new ssh behave like old one" ?

Thanks.

_______________________________________________
freebsd-hackers@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-hackers
To unsubscribe, send any mail to "freebsd-hackers-unsubscr...@freebsd.org"

Reply via email to