faq_hostkey » Revisions »
Differences
This shows you the differences between the selected revisions of the page.
2019-03-08 | 2019-04-06 | ||
suggest using SHA-256 fingerprint in automation (martin) | obtaining anchor (martin) | ||
Line 3: | Line 3: | ||
You should get an SSH host key fingerprint along with your credentials from a server administrator. Knowing the host key fingerprint and thus [[ssh_verifying_the_host_key|being able to verify it]] is an integral part of securing an SSH connection. It prevents [[wp>Man-in-the-middle_attack|man-in-the-middle attacks]]. | You should get an SSH host key fingerprint along with your credentials from a server administrator. Knowing the host key fingerprint and thus [[ssh_verifying_the_host_key|being able to verify it]] is an integral part of securing an SSH connection. It prevents [[wp>Man-in-the-middle_attack|man-in-the-middle attacks]]. | ||
- | ===== Safely obtaining host key ===== | + | ===== [[obtaining]] Safely obtaining host key ===== |
In the real world, most administrators do not provide the host key fingerprint. | In the real world, most administrators do not provide the host key fingerprint. |