Change mac osx RSA key log for a specific host.

Posted on 2007-10-10
Last Modified: 2013-11-24
I have a macbook, osx 10.4, and I have a coyote linux router setup. I logged into the linux box and received the key from linux to my mac. But i had to make some drastic changes to the linux config so I made a new install of it. Basically the RSA key of the linux box changed and now i can't ssh into it from my mac because it thinks its a security risk.

Im a newbie with mac (always been a hater of mac, but kinda like the closed hardware architecture of it, runs great with parallels). How do you edit, and find, the log file that holds the keys and modify it for a specific host.

Thanks in advance.
Question by:deomega22
    LVL 19

    Accepted Solution

    In your home directory you'll have a directory called .ssh in which there should be a file called known hosts. Edit that and remove the entry for your linux box. If you open up a terminal window, type

    vi ~/.ssh/known_hosts

    then use the arrow keys to navigate to the line of your linux box, hit d twice in rapid succession to delete the line then type :wq and press enter to save the file.

    PS. Always worth learning how to use vi, very cool text editor. You could also use pico/nano, but your friends may laugh at you :)

    Author Comment

    Thanks Alextoft:

    There is still alot to learn with this os... ugh

    another thing i found earlier today is how to "show hidden files and folders", which would of helped me out earlier. Incase anyone wants to know how to use it:

    open up terminal and type this : defaults write AppleShowAllFiles TRUE

    Featured Post

    IT, Stop Being Called Into Every Meeting

    Highfive is so simple that setting up every meeting room takes just minutes and every employee will be able to start or join a call from any room with ease. Never be called into a meeting just to get it started again. This is how video conferencing should work!

    Join & Write a Comment

    Secure Shell (SSH) is a network protocol for secure data communication, mainly used to administer remote Unix / Linux servers via command line. But it also allows the user to open a secure tunnel between a client and a server where he can send any k…
    The purpose of this article is to demonstrate how we can use conditional statements using Python.
    Learn how to get help with Linux/Unix bash shell commands. Use help to read help documents for built in bash shell commands.: Use man to interface with the online reference manuals for shell commands.: Use man to search man pages for unknown command…
    Connecting to an Amazon Linux EC2 Instance from Windows Using PuTTY.

    729 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    18 Experts available now in Live!

    Get 1:1 Help Now