faq_hostkey » Revisions »
Differences
This shows you the differences between the selected revisions of the page.
2019-03-08 | 2019-04-03 | ||
suggest using SHA-256 fingerprint in automation (martin) | no summary (206.226.154.253) (hidden) (untrusted) | ||
Line 15: | Line 15: | ||
If you need to know the fingerprint later on for other purposes, like to verify the host key on another machine, or for automation, go to a //[[ui_fsinfo|Server and Protocol Information Dialog]]//. See a //Server Host key Fingerprint// box. | If you need to know the fingerprint later on for other purposes, like to verify the host key on another machine, or for automation, go to a //[[ui_fsinfo|Server and Protocol Information Dialog]]//. See a //Server Host key Fingerprint// box. | ||
- | ===== [[from_putty]] Obtaining host key from PuTTY ===== | + | Hi :) |
- | + | ||
- | If you already have the host key cached in the PuTTY SSH client, you can import a PuTTY stored session to WinSCP, including the cached host keys. Make sure the //Import cached host keys for checked sites// option is checked when [[ui_import|importing the sessions]]. | + | |
- | + | ||
- | You can also have the fingerprint displayed in an %%SSH%% terminal using ''[[https://man.openbsd.org/ssh-keygen|ssh-keygen]]'' command (on *nix servers using OpenSSH server): | + | |
- | + | ||
- | <code> | + | |
- | ssh-keygen -l -f /etc/ssh/ssh_host_rsa_key | + | |
- | ssh-keygen -l -f /etc/ssh/ssh_host_dsa_key | + | |
- | ssh-keygen -l -f /etc/ssh/ssh_host_ecdsa_key | + | |
- | </code> | + | |
- | + | ||
- | Since OpenSSH 6.8, you have to add the ''-E md5'' switch to get the format needed for WinSCP. | + | |
===== Host key of your virtual server ===== | ===== Host key of your virtual server ===== |