Differences

This shows you the differences between the selected revisions of the page.

2018-08-03 2019-01-24
Restored revision 1505231650. Undoing revision 1533276590. (martin) (hidden) f8:c1:2a:67:1c:04:73:66:f5:c4:fe:3e:95:f4:09:67 (105.142.244.69) (hidden) (untrusted)
Line 1: Line 1:
====== Where do I get SSH host key fingerprint to authorize the server? ====== ====== Where do I get SSH host key fingerprint to authorize the server? ======
 +
===== Host key fingerprint is an integral part of session information ===== ===== Host key fingerprint is an integral part of session information =====
You should get an SSH host key fingerprint along with your credentials from a server administrator. Knowing the host key fingerprint and thus [[ssh_verifying_the_host_key|being able to verify it]] is an integral part of securing an SSH connection. It prevents [[wp>Man-in-the-middle_attack|man-in-the-middle attacks]]. You should get an SSH host key fingerprint along with your credentials from a server administrator. Knowing the host key fingerprint and thus [[ssh_verifying_the_host_key|being able to verify it]] is an integral part of securing an SSH connection. It prevents [[wp>Man-in-the-middle_attack|man-in-the-middle attacks]].

Last modified: by 105.142.244.69