Re: tls

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Patrick Dupre wrote:
> 
> I probably need to learn more how to use sftp for having best secure transfers
> using my own key.


Patrick,

All you need to know is the fingerprint of the key on the remote computer.  It
is used to authenticate that you are connecting to the computer you intended to.
Either ask the administrator or, if you are the administrator, enter the 
following command on the remote computer:

  [user@remote ~]$ ssh-keygen -lf /etc/ssh/ssh_host_rsa_key.pub
  2048 d0:f3:c7:b3:bc:d0:87:e4:32:f8:f5:17:2c:cf:d7:a4 /etc/ssh/ssh_host_rsa_key.pub

The first time you try to connect from the local computer you'll be prompted to
verify the authenticity of the remote computer.  Only type 'yes' after you've
made sure that the RSA key fingerprint displayed matches the one you previously
obtained:

  [user@local ~]$ sftp user@remote
  The authenticity of host 'remote (12.34.56.78)' can't be established.
  RSA key fingerprint is d0:f3:c7:b3:bc:d0:87:e4:32:f8:f5:17:2c:cf:d7:a4.
  Are you sure you want to continue connecting (yes/no)? yes
  Warning: Permanently added 'remote,12.34.56.78' (RSA) to the list of known hosts.
  user@remote's password:
  Connected to remote.
  sftp> bye

The public RSA key of the remote computer is now stored on the local computer in
the '~/.ssh/known_hosts' file so that future connections can be automatically
authenticated:

  [user@local ~]$ sftp user@remote
  user@remote's password:
  Connected to remote.
  sftp> bye

If the automatic authentication check fails then the connection will be
terminated with a warning message:

  [user@local ~]$ ssh user@remote
  @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
  @    WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED!     @
  @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
  IT IS POSSIBLE THAT SOMEONE IS DOING SOMETHING NASTY!
  Someone could be eavesdropping on you right now (man-in-the-middle attack)!
  It is also possible that the RSA host key has just been changed.
  The fingerprint for the RSA key sent by the remote host is
  0b:fa:93:03:b8:86:ad:c4:4f:93:1e:69:a1:53:78:8a
  Please contact your system administrator.
  Add correct host key in /home/user/.ssh/known_hosts to get rid of this message.
  Offending key in /home/user/.ssh/known_hosts:60
  RSA host key for remote has changed and you have requested strict checking.
  Host key verification failed.

If you don't see that warning then you can be confident that you have a secure
connection to the intended remote computer for encrypted file transfers.

Regards,

Matthew Roth
InterMedia Marketing Solutions
Software Engineer and Systems Developer
-- 
users mailing list
users@xxxxxxxxxxxxxxxxxxxxxxx
To unsubscribe or change subscription options:
https://admin.fedoraproject.org/mailman/listinfo/users
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct
Guidelines: http://fedoraproject.org/wiki/Mailing_list_guidelines
Have a question? Ask away: http://ask.fedoraproject.org




[Index of Archives]     [Older Fedora Users]     [Fedora Announce]     [Fedora Package Announce]     [EPEL Announce]     [EPEL Devel]     [Fedora Magazine]     [Fedora Summer Coding]     [Fedora Laptop]     [Fedora Cloud]     [Fedora Advisory Board]     [Fedora Education]     [Fedora Security]     [Fedora Scitech]     [Fedora Robotics]     [Fedora Infrastructure]     [Fedora Websites]     [Anaconda Devel]     [Fedora Devel Java]     [Fedora Desktop]     [Fedora Fonts]     [Fedora Marketing]     [Fedora Management Tools]     [Fedora Mentors]     [Fedora Package Review]     [Fedora R Devel]     [Fedora PHP Devel]     [Kickstart]     [Fedora Music]     [Fedora Packaging]     [Fedora SELinux]     [Fedora Legal]     [Fedora Kernel]     [Fedora OCaml]     [Coolkey]     [Virtualization Tools]     [ET Management Tools]     [Yum Users]     [Yosemite News]     [Gnome Users]     [KDE Users]     [Fedora Art]     [Fedora Docs]     [Fedora Sparc]     [Libvirt Users]     [Fedora ARM]

  Powered by Linux