Developer Machines

SSH Host Keys

The SSH host keys for the machines in the domains are stored in the Debian LDAP database. The key and its fingerprint will be displayed when details for a machine are displayed.

Developers that have a secure path to a DNSSEC enabled resolver can verify the existing SSHFP records for the servers by adding VerifyHostKeyDNS yes to their ~/.ssh/config file.

On machines in the which are updated from the LDAP database /etc/ssh/ssh_known_hosts contains the keys for all hosts in this domain. This helps for easier log in into such a machine. This is also be available in the chroot environments.

Developers should add StrictHostKeyChecking yes to their ~/.ssh/config file so that they only connect to trusted hosts. Either with the DNSSEC records or the file mentioned above, nearly all hosts in the domain will be trusted automatically.

Developers can also execute ud-host -f or ud-host -f -h host on a machine in the domain in order to display all host fingerprints or only the fingerprints of a particular host in order to compare it with the output of ssh on an external host.

Exception for Alioth

An exception has been made for the Alioth system since not only Debian developers have an account on this machine. As a result, this machine (or machines in case there are more of one serving as Alioth hosts) is generally not trusted. Hence no passwords (i.e. no shadow file(s)) will be exported to it and their SSH keys are not added to the LDAP system.

Debian Host Naming Scheme

DNSSEC in Debian

You can contact us at

Last Modified: Wed, Jan 2 18:40:23 UTC 2019
Copyright © 1997-2019 SPI; See license terms
Debian is a registered trademark of Software in the Public Interest, Inc.