Thank you Alexander (and Johan) for confirming what I kinda suspected --
 use shared keys if it is a published (ie. failover required) service, 
otherwise bind only to dedicated address(es) using dedicated keys.

On 30 Jan 2013 at 18:33, Alexander Hall wrote:

> On 01/30/13 17:56, System Administrator wrote:
> > I finally got to deploy a CARP firewall cluster (HA failover for now).
> > Using only the official OpenBSD.org documentation, everything went very
> > smoothly even though the setup is not quite trivial (14 carp addresses
> > on 6 active interfaces). I even got system replication going using
> > rdist(1).
> >
> > While testing the failover and trying to ssh to a carp address I got
> > hit with the server key mismatch; hence this email. What is considered
> > best practice wrt ssh keys in a carp cluster -- install the same keys
> > on all member nodes to avoid the alerts or just live with the
> > occasional mismatch?
> 
> Is the ssh service one of the failover'able services?
> 
> If it is, I believe it makes sense to share the keys (that's what I do 
> anyway), alternatively you could have a second sshd configured with a 
> shared HostKey.
> 
> If it is not, I'd suggest letting sshd listen only on the host address 
> and not on the carp address.
> 
> /Alexander

Reply via email to