Differences
This shows you the differences between the selected revisions of the page.
| 2005-08-11 | 2005-12-18 | ||
| public key chapter moved to separate page (martin) | administration (martin) | ||
| Line 38: | Line 38: | ||
| Once the key is verified, you can see it during all future sessions on [[ui_fsinfo#server_hostkey_fingerprint|Server and Protocol Information Dialog]]. | Once the key is verified, you can see it during all future sessions on [[ui_fsinfo#server_hostkey_fingerprint|Server and Protocol Information Dialog]]. | ||
| + | |||
| + | [[administration|System administrator can restrict]] connection to server without having their host keys accepted in advance. | ||
| ===== Encryption in SSH ===== | ===== Encryption in SSH ===== | ||
| Line 79: | Line 81: | ||
| attacks more difficult to execute and by providing less data for | attacks more difficult to execute and by providing less data for | ||
| cryptanalysis. | cryptanalysis. | ||
| + | |||