faq_hostkey » Revisions »
Differences
This shows you the differences between the selected revisions of the page.
2019-01-24 | 2019-01-24 | ||
f8:c1:2a:67:1c:04:73:66:f5:c4:fe:3e:95:f4:09:67 (105.142.244.69) (hidden) (untrusted) | Restored revision 1505231650. Undoing revision 1548353704. (martin) (hidden) | ||
Line 1: | Line 1: | ||
====== Where do I get SSH host key fingerprint to authorize the server? ====== | ====== Where do I get SSH host key fingerprint to authorize the server? ====== | ||
- | |||
===== Host key fingerprint is an integral part of session information ===== | ===== Host key fingerprint is an integral part of session information ===== | ||
You should get an SSH host key fingerprint along with your credentials from a server administrator. Knowing the host key fingerprint and thus [[ssh_verifying_the_host_key|being able to verify it]] is an integral part of securing an SSH connection. It prevents [[wp>Man-in-the-middle_attack|man-in-the-middle attacks]]. | You should get an SSH host key fingerprint along with your credentials from a server administrator. Knowing the host key fingerprint and thus [[ssh_verifying_the_host_key|being able to verify it]] is an integral part of securing an SSH connection. It prevents [[wp>Man-in-the-middle_attack|man-in-the-middle attacks]]. |