-
Notifications
You must be signed in to change notification settings - Fork 0
Open
Description
What steps will reproduce the problem?
1. Connect to a host using, i.e., RSA
2. Verify the host's key fingerprint, which results in it being saved with the
host's profile
3. Connect to the same host again later using ECDSA for whatever reason (it
appears the new version prefers it)
4. A warning message that the host's key has changed is displayed
What is the expected output? What do you see instead?
I would expect that, when the connection algorithm changes, the application
notify me that it's now connecting using a different algorithm and that I
should verify the fingerprint. The current output provides no feedback that
the reason for the changed host fingerprint is because a different algorithm is
being used.
What version of the product are you using (you can see this by using Menu
-> About in the Host List)?
1.8.2 2015.03.22
What type of system are you trying to connect to?
An Ubuntu Linux 12.04 system running OpenSSHd
If you are able to connect, what is the output of "echo $TERM", "uname -a",
and any other relevant information on the host?
No other relevant information.
Please provide any additional information below.
This behavior kind of freaked me out, needless to say, especially when I
connected to the host from other connectivity (with a different client) and got
no warning message, leading me to suspect that my cellular provider was
proxying SSH connections all of a sudden. Once I connected with alternate
means, I was able to verify that the new fingerprint being presented was an
ECDSA fingerprint as opposed to the RSA fingerprint that was saved with the
profile.
Original issue reported on code.google.com by far...@gmail.com on 27 Mar 2015 at 7:54
Reactions are currently unavailable