Differences
This shows you the differences between the selected revisions of the page.
2005-08-11 | 2005-12-18 | ||
public key chapter moved to separate page (martin) | administration (martin) | ||
Line 38: | Line 38: | ||
Once the key is verified, you can see it during all future sessions on [[ui_fsinfo#server_hostkey_fingerprint|Server and Protocol Information Dialog]]. | Once the key is verified, you can see it during all future sessions on [[ui_fsinfo#server_hostkey_fingerprint|Server and Protocol Information Dialog]]. | ||
+ | |||
+ | [[administration|System administrator can restrict]] connection to server without having their host keys accepted in advance. | ||
===== Encryption in SSH ===== | ===== Encryption in SSH ===== | ||
Line 79: | Line 81: | ||
attacks more difficult to execute and by providing less data for | attacks more difficult to execute and by providing less data for | ||
cryptanalysis. | cryptanalysis. | ||
+ |