You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
It would be nice if a key fingerprint was displayed at host key creation. Ass it stands now, there is no way to perform the initial fingerprint verification when you connect.
The text was updated successfully, but these errors were encountered:
No, tinysshd-printkey does not print the fingerprint. It prints the base64 representation of the public key. To get the fingerprint you have to redirect the output to a file, copy that file over to a machine that has OpenSSH, and then use ssh-keygen to display the fingerprint.
# tinysshd-printkey > textkeyfile
Then move textkeyfile to a machine that has openssh, and then
Of course tinysshd-printkey prints the public-key (sorry for the typo "s/fingerprint/public-key/").
But I think You don't need to convert the output to the sha256 fingerprint and check the fingerprint.
You can use the output directly. E.g. directly to the .ssh/known_host file.
It would be nice if a key fingerprint was displayed at host key creation. Ass it stands now, there is no way to perform the initial fingerprint verification when you connect.
The text was updated successfully, but these errors were encountered: