Differences
This shows you the differences between the selected revisions of the page.
| 2012-11-05 | 2012-11-05 | ||
| no summary (92.74.65.122) (hidden) | Restored revision 1348250199. Undoing revision 1352107500. (martin) (hidden) | ||
| Line 4: | Line 4: | ||
| protection against spoofing. | protection against spoofing. | ||
| - | root@192.168.2.101===== Authentication in SSH root192.168.2.101 | + | ===== Authentication in SSH ===== |
| - | ===== | + | |
| SSH servers offer the client a selection of authentication | SSH servers offer the client a selection of authentication | ||
| methods. The server advertises what it supports, and the client | methods. The server advertises what it supports, and the client | ||
| Line 13: | Line 12: | ||
| the option to choose which methods can be used. In WinSCP, you can configure this on [[ui_login_authentication|Login dialog]]. | the option to choose which methods can be used. In WinSCP, you can configure this on [[ui_login_authentication|Login dialog]]. | ||
| - | The actual order of authentication methods is as follows: MIT Kerberos GSSAPI 5 (SSH-2 only), [[public key]] (using [[ui_pageant|Pageant]]), [[public key]] (using [[ui_login_session|configured file]]), keyboard-interactive (SSH-2 only), TIS or Cryptocard (SSH-1 only), password.Alpina | + | The actual order of authentication methods is as follows: MIT Kerberos GSSAPI 5 (SSH-2 only), [[public key]] (using [[ui_pageant|Pageant]]), [[public key]] (using [[ui_login_session|configured file]]), keyboard-interactive (SSH-2 only), TIS or Cryptocard (SSH-1 only), password. |
| ===== Verifying the Host Key ===== | ===== Verifying the Host Key ===== | ||