SSH.COM is one of the most trusted brands in cyber security. We help enterprises and agencies solve the security challenges of digital transformation with innovative access management solutions.
Tectia client tools for z/OS includes a tool to resolve which hashed host key belongs to which server. As there can be several server host keys stored on the client-side host, and the file name does not show the server name, it is sometimes necessary to check if a certain server public key is stored on the client host.
On the command line, the command syntax is:
ssh-keygen-g3 -F examplehost#222
host_name can be the fully qualified domain name, short
host name, or the IP address of the remote host. The
definition is optional in the command. If no port is given, the default Secure Shell port 22
The tool shows the location, fingerprint (in the SSH babble format) and type (RSA, DSA or ECDSA) of the requested host's public key or keys. For example:
ssh-keygen-g3 -F examplehost Fingerprint for key 'examplehost': (from location /home/user44/.ssh2/hostkeys/keys_bf53882dc47bb767edf161a4f636917f8358d635) xuvin-zitil-ducid-gevil-vysok-buviz-nynun-pinat-tylev-gusez-dyxix (RSA)
If no keys are found for the given server, the ssh-keygen-g3
-F command will report where it looked for the keys, and will conclude as
/ No keys found from any key directories or known_hosts files.
You can define several file locations to be checked for host keys. For more information,
see Using the OpenSSH