debian.org Developer Machines
SSH Host Keys
The SSH host keys for the machines in the debian.org domains are stored in the Debian LDAP database. The key and its fingerprint will be displayed when details for a machine are displayed.
Developers that have a secure path to a DNSSEC enabled resolver can
verify the existing SSHFP records for the debian.org servers by adding
VerifyHostKeyDNS yes to their
On machines in the debian.org which are updated from the LDAP
/etc/ssh/ssh_known_hosts contains the keys for
all hosts in this domain. This helps for easier log in into such a
machine. This is also be available in the chroot environments.
Developers should add
StrictHostKeyChecking yes to
~/.ssh/config file so that they only connect to
trusted hosts. Either with the DNSSEC records or the file mentioned
above, nearly all hosts in the debian.org domain will be trusted
Developers can also execute
ud-host -f or
ud-host -f -h host on a machine in the debian.org domain
in order to display all host fingerprints or only the fingerprints of
a particular host in order to compare it with the output of
ssh on an external host.
Exception for Alioth
An exception has been made for the Alioth system since not only Debian developers have an account on this machine. As a result, this machine (or machines in case there are more of one serving as Alioth hosts) is generally not trusted. Hence no passwords (i.e. no shadow file(s)) will be exported to it and their SSH keys are not added to the LDAP system.
You can contact us at email@example.com.