summaryrefslogtreecommitdiff
path: root/src/op_mode/show-ssh-fingerprints.py
diff options
context:
space:
mode:
authorJeffWDH <jeffwdh@github.com>2023-10-21 14:29:05 -0400
committerJeffWDH <jeffwdh@github.com>2023-10-21 14:29:05 -0400
commit8cdf6eb47052445cde3b4f22e422afa9422a9a73 (patch)
tree9015b9842f47a5a02d99f0d245330591bac17e60 /src/op_mode/show-ssh-fingerprints.py
parent69fb230ee022100234af233f2a2823f887c95059 (diff)
downloadvyos-1x-8cdf6eb47052445cde3b4f22e422afa9422a9a73.tar.gz
vyos-1x-8cdf6eb47052445cde3b4f22e422afa9422a9a73.zip
T5661: Add show show ssh dynamic-protection attacker and show log ssh dynamic-protection
Diffstat (limited to 'src/op_mode/show-ssh-fingerprints.py')
-rw-r--r--src/op_mode/show-ssh-fingerprints.py49
1 files changed, 0 insertions, 49 deletions
diff --git a/src/op_mode/show-ssh-fingerprints.py b/src/op_mode/show-ssh-fingerprints.py
deleted file mode 100644
index 913baae46..000000000
--- a/src/op_mode/show-ssh-fingerprints.py
+++ /dev/null
@@ -1,49 +0,0 @@
-#!/usr/bin/env python3
-#
-# Copyright 2017-2023 VyOS maintainers and contributors <maintainers@vyos.io>
-#
-# This library is free software; you can redistribute it and/or
-# modify it under the terms of the GNU Lesser General Public
-# License as published by the Free Software Foundation; either
-# version 2.1 of the License, or (at your option) any later version.
-#
-# This library is distributed in the hope that it will be useful,
-# but WITHOUT ANY WARRANTY; without even the implied warranty of
-# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
-# Lesser General Public License for more details.
-#
-# You should have received a copy of the GNU Lesser General Public
-# License along with this library. If not, see <http://www.gnu.org/licenses/>.
-
-import sys
-import glob
-import argparse
-from vyos.utils.process import cmd
-
-# Parse command line
-parser = argparse.ArgumentParser()
-parser.add_argument("--ascii", help="Show visual ASCII art representation of the public key", action="store_true")
-args = parser.parse_args()
-
-# Get list of server public keys
-publickeys = glob.glob("/etc/ssh/*.pub")
-
-if publickeys:
- print("SSH server public key fingerprints:\n", flush=True)
- for keyfile in publickeys:
- if args.ascii:
- try:
- print(cmd("ssh-keygen -l -v -E sha256 -f " + keyfile) + "\n", flush=True)
- # Ignore invalid public keys
- except:
- pass
- else:
- try:
- print(cmd("ssh-keygen -l -E sha256 -f " + keyfile) + "\n", flush=True)
- # Ignore invalid public keys
- except:
- pass
-else:
- print("No SSH server public keys are found.", flush=True)
-
-sys.exit(0)