-
-
Notifications
You must be signed in to change notification settings - Fork 454
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Question about the ssh parameters #104
Comments
I guess that could indeed be optional although I'm not really familiar with these parameters. @fustundag, do you remember why it was implemented this way? |
@laurent22 If host key changed ( not public/private key, ssh access is stili valid) backup cloud be failed. I choose this option to prevent this fail. We can change to decide user this ssh config. |
Also it's becomes permanent warning:
that falls to stdout. |
The scenario is: Every host has a pubplic/private key pair which allows you to identify it distinctly. The keys are stored in your Having this option included by default prevents the host validation check done by the SSH client and thus undermines an important security feature. I think it would be better to remove it and let each user decide to opt in if required (by using
This should only happen if you only have the second part enabled ( |
I know. But it's enabled by default. And there is no way to disable it without code modification. |
… by removing the hard coded SSH option to bypass `StrictHostKeyChecking` and the `UserKnownHostsFile`. Closes laurent22#104
Maybe a better way to set SSH parameters is to do this like
Then, allow users to set their own SSH parameters and take responsibility for their SSH settings. |
Why is this part of the ssh command:
Wouldn't it be better to let the user configure this in it's
ssh_config
instead of generally using it and thus weaken the security?From the man page
man ssh_config
:and
The text was updated successfully, but these errors were encountered: