Skip to content

Instantly share code, notes, and snippets.

@jjmcdn
Created October 21, 2016 16:53
Show Gist options
  • Save jjmcdn/38e6101dafc0568113fba3a4f744583d to your computer and use it in GitHub Desktop.
Save jjmcdn/38e6101dafc0568113fba3a4f744583d to your computer and use it in GitHub Desktop.
SSH Fingerprint in DNSSEC

Copied from www.lorier.net/docs/sshfp, all credit there.

SSH Fingerprint in DNS

If you have DNSSEC setup (and are validating using it!) you might consider using SSHFP to avoid the "The authenticity of host 'blah blah blah' can't be established." This is an alternative solution to signing the SSH host public key with a certificate.

Personally, I'd recommend the ssh ca approach as being more sensible, and foolproof, but there are situations where it's not appropriate.

sudo ssh-keygen -r $(hostname) >>/etc/bind/db.$(hostname --domain)

Resign the zone, kill -HUP $(pidof named) and you're done.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment