Timeline for Suppressing your IP address from being entered into the known_hosts file in setting up SSH
Current License: CC BY-SA 4.0
6 events
| when toggle format | what | by | license | comment | |
|---|---|---|---|---|---|
| Mar 1, 2022 at 20:30 | answer | added | Kenster | timeline score: 3 | |
| Mar 1, 2022 at 20:18 | comment | added | steeldriver | You could at least hash the entries - see Is it possible to find out the hosts in the known_hosts file? | |
| Mar 1, 2022 at 19:54 | comment | added | Romeo Ninov | And one more point: history will give the information about the host also :) | |
| Mar 1, 2022 at 19:44 | comment | added | dirkt | Also note that once someone has access to your system and stolen the keys, it's not that hard to scan the complete IPv4 range and try out the keys. So unless you are using IPv6 only, trying to "hide" the IPv4 addresses is not going to help. OTOH, disabling MITM tampering detection via known_hosts opens a new security hole. | |
| Mar 1, 2022 at 19:12 | comment | added | mashuptwice | Note that this is not the only file where you can find the IP addresses of recent ssh clients. They are for example also included in /var/log/wtmp | |
| Mar 1, 2022 at 19:10 | history | asked | Carbon | CC BY-SA 4.0 |