Differences

This shows you the differences between the selected revisions of the page.

2019-03-08 2019-04-03
suggest using SHA-256 fingerprint in automation (martin) no summary (206.226.154.253) (hidden) (untrusted)
Line 15: Line 15:
If you need to know the fingerprint later on for other purposes, like to verify the host key on another machine, or for automation, go to a //[[ui_fsinfo|Server and Protocol Information Dialog]]//. See a //Server Host key Fingerprint// box. If you need to know the fingerprint later on for other purposes, like to verify the host key on another machine, or for automation, go to a //[[ui_fsinfo|Server and Protocol Information Dialog]]//. See a //Server Host key Fingerprint// box.
-===== [[from_putty]] Obtaining host key from PuTTY ===== +Hi :)
- +
-If you already have the host key cached in the PuTTY SSH client, you can import a PuTTY stored session to WinSCP, including the cached host keys. Make sure the //Import cached host keys for checked sites// option is checked when [[ui_import|importing the sessions]]. +
- +
-You can also have the fingerprint displayed in an %%SSH%% terminal using ''[[https://man.openbsd.org/ssh-keygen|ssh-keygen]]'' command (on *nix servers using OpenSSH server)+
- +
-<code> +
-ssh-keygen -l -f /etc/ssh/ssh_host_rsa_key +
-ssh-keygen -l -f /etc/ssh/ssh_host_dsa_key +
-ssh-keygen -l -f /etc/ssh/ssh_host_ecdsa_key +
-</code> +
- +
-Since OpenSSH 6.8, you have to add the ''-E md5'' switch to get the format needed for WinSCP.+
===== Host key of your virtual server ===== ===== Host key of your virtual server =====

Last modified: by 206.226.154.253