[Okta Webinar] Learn how to a build a cloud-first strategyRegister Now


Change mac osx RSA key log for a specific host.

Posted on 2007-10-10
Medium Priority
Last Modified: 2013-11-24
I have a macbook, osx 10.4, and I have a coyote linux router setup. I logged into the linux box and received the key from linux to my mac. But i had to make some drastic changes to the linux config so I made a new install of it. Basically the RSA key of the linux box changed and now i can't ssh into it from my mac because it thinks its a security risk.

Im a newbie with mac (always been a hater of mac, but kinda like the closed hardware architecture of it, runs great with parallels). How do you edit, and find, the log file that holds the keys and modify it for a specific host.

Thanks in advance.
Question by:deomega22
LVL 19

Accepted Solution

alextoft earned 2000 total points
ID: 20054449
In your home directory you'll have a directory called .ssh in which there should be a file called known hosts. Edit that and remove the entry for your linux box. If you open up a terminal window, type

vi ~/.ssh/known_hosts

then use the arrow keys to navigate to the line of your linux box, hit d twice in rapid succession to delete the line then type :wq and press enter to save the file.

PS. Always worth learning how to use vi, very cool text editor. You could also use pico/nano, but your friends may laugh at you :)

Author Comment

ID: 20062127
Thanks Alextoft:

There is still alot to learn with this os... ugh

another thing i found earlier today is how to "show hidden files and folders", which would of helped me out earlier. Incase anyone wants to know how to use it:

open up terminal and type this : defaults write com.apple.finder AppleShowAllFiles TRUE

Featured Post

[Webinar] Cloud and Mobile-First Strategy

Maybe you’ve fully adopted the cloud since the beginning. Or maybe you started with on-prem resources but are pursuing a “cloud and mobile first” strategy. Getting to that end state has its challenges. Discover how to build out a 100% cloud and mobile IT strategy in this webinar.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Today, still in the boom of Apple, PC's and products, nearly 50% of the computer users use Windows as graphical operating systems. If you are among those users who love windows, but are grappling to keep the system's hard drive optimized, then you s…
I have written articles previously comparing SARDU and YUMI.  I also included a couple of lines about Easy2boot (easy2boot.com).  I have now been using, and enjoying easy2boot as my sole multiboot utility for some years and realize that it deserves …
Learn how to find files with the shell using the find and locate commands. Use locate to find a needle in a haystack.: With locate, check if the file still exists.: Use find to get the actual location of the file.:
Viewers will learn how to properly install and use Secure Shell (SSH) to work on projects or homework remotely. Download Secure Shell: Follow basic installation instructions: Open Secure Shell and use "Quick Connect" to enter credentials includi…
Suggested Courses

873 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question