Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

docs: add ssh host key error to known issues #5250

Open
wants to merge 4 commits into
base: main
Choose a base branch
from
Open

Conversation

amitsk6
Copy link

@amitsk6 amitsk6 commented Nov 18, 2024

host key error for man in the middle attack is commonly encountered while connecting ssh target, updated docs to help troubleshoot this issue.

@amitsk6 amitsk6 requested a review from a team as a code owner November 18, 2024 05:27
Copy link

hashicorp-cla-app bot commented Nov 18, 2024

CLA assistant check
All committers have signed the CLA.

Copy link

CLA assistant check

Thank you for your submission! We require that all contributors sign our Contributor License Agreement ("CLA") before we can accept the contribution. Read and sign the agreement

Learn more about why HashiCorp requires a CLA and what the CLA includes

Have you signed the CLA already but the status is still pending? Recheck it.

amitsk6 and others added 2 commits November 19, 2024 11:27
Co-authored-by: Johan Brandhorst-Satzkorn <johan.brandhorst@gmail.com>
Copy link
Contributor

@Dan-Heath Dan-Heath left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thank you for this update @amitsk6 ! I suggested a revision to use active voice and simplify the first sentence a bit. If it sounds good to you, I will get this published.

@@ -510,6 +510,16 @@ $ boundary client-agent pause

Follow the troubleshooting steps to understand why the Client Agent is not able to reach the controller.

#### WARNING! Remote host indentification has changed! It is possible that someone is doing something nasty!

This issue arises when using SSH to connect to an SSH target through an alias after the first successful connection to that alias. The issue is due to the way Boundary workers generate a new host key on every new SSH connection. The warning can safely be ignored using the `StrictHostKeyChecking=no` command line option:
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
This issue arises when using SSH to connect to an SSH target through an alias after the first successful connection to that alias. The issue is due to the way Boundary workers generate a new host key on every new SSH connection. The warning can safely be ignored using the `StrictHostKeyChecking=no` command line option:
This error arises when you use an alias to connect to an SSH target after the first successful connection using that alias. The issue occurs because Boundary workers generate a new host key on every new SSH connection. You can safely ignore the warning using the `StrictHostKeyChecking=no` command line option:

@Dan-Heath Dan-Heath self-assigned this Nov 19, 2024
@Dan-Heath Dan-Heath added the backport/website Backport changes to `stable-website` and the latest release-branch label Nov 19, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
backport/website Backport changes to `stable-website` and the latest release-branch website
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants