On Tue, May 18, 2010 at 2:19 PM, Kamal Ahmed <kamal2222ahmed / yahoo.com> wro=
te:

> I actually FOUND the solution:

You seem to have misspelled "DOS vector" :-)

> =A0Net::SSH.start( value_hosts, USER, :password =3D> PASS , =A0:paranoid =
=3D>
> false ) do|ssh |
> =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0# The rescue block is used=
 to ignore the change
> in key and still login using ssh
> =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0begin
> =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0rescue Net::SSH::HostKeyMi=
smatch =3D> e
> =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0puts "remembering new =
key: #{e.fingerprint}"
> =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0e.remember_host!
> =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0retry
> =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0 =A0end

And wouldn't it be amusing if a malicious compromised host just kept
on providing a different host key to each request ...

--=20
Hassan Schroeder ------------------------ hassan.schroeder / gmail.com
twitter: @hassan