Administrators that have other users connecting to their server should notify the users of any host key changes. The users will receive a warning the next time they connect because the host key the users have saved on their disk for your server does not match the host key now being actually provided by your server. The users may not know how to respond to this warning.
You can run ssh-keygen-g3
to calculate the fingerprint of your
new public host key and you can provide the fingerprint to your users via some unalterable
method (for example, by a digitally signed e-mail or by displaying the fingerprint on a
secured bulletin board).
On Unix, the command for calculating the fingerprint is:
# ssh-keygen-g3 -F hostkey.pub
On Windows, the command is:
ssh-keygen-g3.exe -F hostkey.pub
When the users connect and receive the error message about the host key having changed, they can compare the fingerprint of the new key with the fingerprint you have provided in your e-mail, and ensure that they are connecting to the correct Tectia Server. Inform your users to notify you if the fingerprints do not match, or if they receive a message about a host key change and do not receive a corresponding message from you notifying them of the change.
This procedure can help ensure that you do not become a victim of a man-in-the-middle attack, as your users will notify you if the host key fingerprints do not match.
It is also possible to send the public host key to the users via an
unalterable method. The users can save the key in the $HOME/.ssh2/hostkeys
directory on Unix or in the %APPDATA%\SSH\HostKeys
directory on Windows as
key_<port>_<host>.pub
(for example,
key_22_banana.ssh.com.pub
). In this case, a manual fingerprint check is not
needed.