Re: One account with multiple keys -- which one was used?



On Mon, 11 Sep 2006, Wayne Betts wrote:

If I have an account (eg. operator) with multiple public keys in the
~operator/.ssh/authorized_keys{,2} file, can I determine which key was
used by a given login,

Find in your log file something like

... sshd ... auth.info ... Found matching RSA key: ec:1b:2e:...

(you need ``LogLevel VERBOSE'' for this).

You can get the fingerprint of a public key with

ssh-keygen -lf public-key-file

By comparing fingerprint with log you can find which key was used.

--
Regards,
ASK



Relevant Pages

  • Re: winnt provider and lastlogin using vbscript
    ... However, during the login ... Set objFile = objFSO.OpenTextFile ... On Error GoTo 0 ... ' Save the new last logon date/time in the log file. ...
    (microsoft.public.scripting.vbscript)
  • Re: Bad update - X11 corrupted
    ... OK, there was no 'rhgb' in my boot loader, so I got in and manually ... the log file, but no help there. ... When the login prompt comes up, ... >> there, so keeps cycling from text login to graphical login and back, ...
    (Fedora)
  • Re: XP Pro SP 3 - Task Scheduler
    ... id and one for the other person with their login id. ... There is a log for STs, so if you never knew about it, you won't mind ... Delete or rename the probably cluttered ST log file which is here: ... Restart the Task Scheduler service to create a new log. ...
    (microsoft.public.windowsxp.help_and_support)
  • Re: Installation of Silverlight
    ... Boot to safe mode and login as Administrator ... Create a New adminstrator account ... Error opening installation log file. ...
    (microsoft.public.windowsupdate)
  • Re: Best Way to Do Shared Logins
    ... The date and time was 11/18/2008 5:00 PM, and on a whim, Terry R. pounded out on the keyboard: ... What I am thinking about is a shared login, and then maybe some kind of custom process like a script or custom developed application that forces the user to provide his or her individual login information. ... The custom process would not do any authentication, but would verify that the login is valid and then log the information to a log file somewhere that the users would not be able to access. ...
    (microsoft.public.windowsxp.general)