Skip to content
This repository has been archived by the owner on Jan 24, 2022. It is now read-only.

Abstract host key fingerprint generation out of scan_engine into it's own thing #84

Closed
claudijd opened this issue Aug 15, 2016 · 2 comments

Comments

@claudijd
Copy link
Contributor

claudijd commented Aug 15, 2016

Here's some basic guidelines...

1.) Must support RSA, DSA, and ECDSA
2.) Must generate md5, sha1, and sha256 fingeprints (with an eye toward other fingerprint styles in use or upcoming)
3.) Must be fully spec'd out so we easily prove in unit-tests that our coverage is good and works as expected (perhaps even using openssh/openssl as a verification point before we lock in the fingerprints in the specs)
4.) Must have a soft-failure mechanism when the host key type is unsupported and then send a warning to the command-line much like the current implementation does

@flash1452
Copy link
Contributor

@claudijd I would like to work on this issue.

@claudijd
Copy link
Contributor Author

claudijd commented Sep 2, 2016

@flash1452 sounds good, give it a whirl. Thanks!

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Projects
None yet
Development

No branches or pull requests

2 participants