IgnoreUserKnownHosts
Specifies whether sshd should ignore the user's
$HOME/.ssh/known_hosts during RhostsRSAAuthentication
or HostbasedAuthentication. The default is ``no''.
So I set this to 'yes' in the sshd_config file on both client and
server and restarted ssh.
It doesn't seem to do anything. When I connect to a machine, it will
still put the key in ~/.ssh/known_host2, and if I go in and manually
change this key so that it is incorrect and try to connect again, it
will give the familiar message:
root:admin00> ssh admin02
Warning: the RSA host key for 'admin02' differs from the key for the
IP address '149.191.25.44'
Matching host key in /usr/local/etc/ssh_known_hosts2:18
Offending key for IP in //.ssh/known_hosts2:2
Are you sure you want to continue connecting (yes/no)? no
Aborted by user!
Is there a way to get ssh to ignore the user's known_hosts file?
Your real problem, is that you should not be replacing your host keys.
When you "rebuild a host or re-install SSH," you should not "generate a
new key." They are long-term identifiers for the hosts; once you've
created them, they get distributed, and you must preserve them or cause
problems for yourself and your users.
Of course, periodic or occasional replacement of host keys may be
necessary for security reasons, and that's a pain with the OpenSSH scheme.
PKI support such as that provided by the ssh.com product addresses this
problem. But you should definitely not be changing keys for the reasons
you cite.
--
Richard Silverman
sl...@shore.net
the manpage talks about the server and
you talk about the client.