Answer by MiKK for ssh: automatically accept keys
I tried the approaches suggested in this thread. Best fit to my needs is summarized below:ssh -o StrictHostKeyChecking=accept-new -o ConnectTimeout=10 -i <filepath to .pem RSA key>...
View ArticleAnswer by Srinath Sridharan for ssh: automatically accept keys
Though it's too late to answer this, wanted to share my contribution.I just made a quick bash script to ease my life.Basically, whenever you ssh into a machine, it removes the old host key and adds the...
View ArticleAnswer by Samarth S for ssh: automatically accept keys
Add this entry into ~/.ssh/config fileHost * StrictHostKeyChecking noIf it complains about access permission for ~/.ssh/config, then try$ chmod 644 ~/.ssh/config
View ArticleAnswer by Waqas Khan for ssh: automatically accept keys
In order to add a list of servers automatically we can do below:Add servers IP in file servers-listThe IPs should be added in below format.Output of cat servers-list123.1.2.3124.1.2.4123.1.2.5Change...
View ArticleAnswer by tink for ssh: automatically accept keys
I'm a bit late with this response, but the sensible way would be to do a ssh-keyscan on the new machine before you run the uptime gathering.ssh-keyscan <newhost> >>...
View ArticleAnswer by mhost for ssh: automatically accept keys
You can use the following command to add the fingerprint for a server to your known_hostsssh-keyscan -H <ip-address> >> ~/.ssh/known_hostsssh-keyscan -H <hostname> >>...
View ArticleAnswer by Lekensteyn for ssh: automatically accept keys
Use the StrictHostKeyChecking option, for example:ssh -oStrictHostKeyChecking=no $h uptimeThis option can also be added to ~/.ssh/config, e.g.:Host somehost Hostname 10.0.0.1 StrictHostKeyChecking...
View Articlessh: automatically accept keys
I've written this small utility script:for h in $SERVER_LIST; do ssh $h "uptime"; doneWhen a new server is added to $SERVER_LIST, the script is stopped with:The authenticity of host 'blah.blah.blah...
View Article