2013-09-19 06:09:33 +02:00
|
|
|
# identify hashed hosts in known_hosts and suggest command line for their
|
|
|
|
# removal
|
|
|
|
|
2014-02-14 15:54:10 +01:00
|
|
|
diff --git a/openssh-6.5p1/sshconnect.c b/openssh-6.5p1/sshconnect.c
|
|
|
|
--- a/openssh-6.5p1/sshconnect.c
|
|
|
|
+++ b/openssh-6.5p1/sshconnect.c
|
|
|
|
@@ -1067,16 +1067,21 @@ check_host_key(char *hostname, struct so
|
2013-09-19 06:09:33 +02:00
|
|
|
ip_found->file, ip_found->line);
|
|
|
|
}
|
|
|
|
/* The host key has changed. */
|
|
|
|
warn_changed_key(host_key);
|
|
|
|
error("Add correct host key in %.100s to get rid of this message.",
|
|
|
|
user_hostfiles[0]);
|
|
|
|
error("Offending %s key in %s:%lu", key_type(host_found->key),
|
|
|
|
host_found->file, host_found->line);
|
|
|
|
+ error("You can use following command to remove all keys for this IP:");
|
|
|
|
+ if (host_found->file)
|
|
|
|
+ error("ssh-keygen -R %s -f %s", hostname, host_found->file);
|
|
|
|
+ else
|
|
|
|
+ error("ssh-keygen -R %s", hostname);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* If strict host key checking is in use, the user will have
|
|
|
|
* to edit the key manually and we can only abort.
|
|
|
|
*/
|
|
|
|
if (options.strict_host_key_checking) {
|
|
|
|
error("%s host key for %.200s has changed and you have "
|
|
|
|
"requested strict checking.", type, host);
|