Device-internal SSH/SSL keys

All devices that are delivered with a LCOS version older than 8.84 are factory-equipped with a set of pre-defined cryptographic keys of 1024 bits in length, which represent the following fingerprints:

SSH
    ssh-dss 27:c5:1d:9f:be:27:3d:50:d7:bf:c1:68:0b:18:97:d7
    ssh-rsa 03:56:e6:52:ee:d2:da:f0:73:b5:df:3d:09:08:54:b7
SSL
    SHA-1: f9:14:7f:7c:e0:15:20:b6:71:94:46:3f:0e:00:93:9c:ad:ff:d9:fb
    MD5:   ac:5b:45:2d:f9:20:3e:0b:b0:45:35:44:b8:3a:de:c6

The device transmits these fingerprints when establishing secure connections (e.g. via SSH or SSL) to the requesting remote site. On the basis of the fingerprint, the remote site can 1) uniquely identify the device and 2) verify that it has connected to the correct device, which is classified as trustworthy.

For example, if you use LANconfig to select the communication protocol SSH and you connect to a device for the first time, LANconfig produces a security query asking you whether the ssh-rsa key is known to you and whether you want LANconfig to accept this device as 'known' in future.

Wichtig: Because these keys are the same for all devices, you should replace these keys with individual keys for productive operations (see Automatic generation of device-specific SSH/SSL keys). Models with certain firmware versions and sufficient entropy also automatically attempt to create device-specific keys (see Automatic generation of device-specific SSH/SSL keys).