This is an initial implementation and not a replacement candidate
for ssh-keyscan since it does only scan the key of the algorithm
the client and server agreed upon. This agreement may change
depending on the key being used, making it useless for distributed
usages.