Skip to main content

You are not logged in. Your edit will be placed in a queue until it is peer reviewed.

We welcome edits that make the post easier to understand and more valuable for readers. Because community members review edits, please try to make the post substantially better than how you found it, for example, by fixing grammar or adding additional resources and hyperlinks.

4
  • 1
    Note that this is not the only file where you can find the IP addresses of recent ssh clients. They are for example also included in /var/log/wtmp Commented Mar 1, 2022 at 19:12
  • 1
    Also note that once someone has access to your system and stolen the keys, it's not that hard to scan the complete IPv4 range and try out the keys. So unless you are using IPv6 only, trying to "hide" the IPv4 addresses is not going to help. OTOH, disabling MITM tampering detection via known_hosts opens a new security hole. Commented Mar 1, 2022 at 19:44
  • 1
    And one more point: history will give the information about the host also :) Commented Mar 1, 2022 at 19:54
  • 1
    You could at least hash the entries - see Is it possible to find out the hosts in the known_hosts file? Commented Mar 1, 2022 at 20:18