summaryrefslogtreecommitdiff
path: root/sshconnect.c
diff options
context:
space:
mode:
authorScott Moser <smoser@ubuntu.com>2014-02-09 16:10:03 +0000
committerColin Watson <cjwatson@debian.org>2019-10-09 23:07:49 +0100
commitfdcf8c0343564121a89be817386c5feabd40c609 (patch)
tree2d553dfcb5b7402d48975583424f9b3c4d45e54c /sshconnect.c
parent6220be7f65137290fbe3ad71b83667e71e4ccd03 (diff)
Mention ssh-keygen in ssh fingerprint changed warning
Author: Chris Lamb <lamby@debian.org> Bug: https://bugzilla.mindrot.org/show_bug.cgi?id=1843 Bug-Ubuntu: https://bugs.launchpad.net/bugs/686607 Last-Update: 2017-08-22 Patch-Name: mention-ssh-keygen-on-keychange.patch
Diffstat (limited to 'sshconnect.c')
-rw-r--r--sshconnect.c9
1 files changed, 8 insertions, 1 deletions
diff --git a/sshconnect.c b/sshconnect.c
index 644057bc4..41e75a275 100644
--- a/sshconnect.c
+++ b/sshconnect.c
@@ -990,9 +990,13 @@ check_host_key(char *hostname, struct sockaddr *hostaddr, u_short port,
990 error("%s. This could either mean that", key_msg); 990 error("%s. This could either mean that", key_msg);
991 error("DNS SPOOFING is happening or the IP address for the host"); 991 error("DNS SPOOFING is happening or the IP address for the host");
992 error("and its host key have changed at the same time."); 992 error("and its host key have changed at the same time.");
993 if (ip_status != HOST_NEW) 993 if (ip_status != HOST_NEW) {
994 error("Offending key for IP in %s:%lu", 994 error("Offending key for IP in %s:%lu",
995 ip_found->file, ip_found->line); 995 ip_found->file, ip_found->line);
996 error(" remove with:");
997 error(" ssh-keygen -f \"%s\" -R \"%s\"",
998 ip_found->file, ip);
999 }
996 } 1000 }
997 /* The host key has changed. */ 1001 /* The host key has changed. */
998 warn_changed_key(host_key); 1002 warn_changed_key(host_key);
@@ -1001,6 +1005,9 @@ check_host_key(char *hostname, struct sockaddr *hostaddr, u_short port,
1001 error("Offending %s key in %s:%lu", 1005 error("Offending %s key in %s:%lu",
1002 sshkey_type(host_found->key), 1006 sshkey_type(host_found->key),
1003 host_found->file, host_found->line); 1007 host_found->file, host_found->line);
1008 error(" remove with:");
1009 error(" ssh-keygen -f \"%s\" -R \"%s\"",
1010 host_found->file, host);
1004 1011
1005 /* 1012 /*
1006 * If strict host key checking is in use, the user will have 1013 * If strict host key checking is in use, the user will have