Differences
This shows you the differences between the selected revisions of the page.
2012-11-05 | 2012-11-05 | ||
no summary (92.74.65.122) (hidden) | Restored revision 1348250199. Undoing revision 1352107500. (martin) (hidden) | ||
Line 4: | Line 4: | ||
protection against spoofing. | protection against spoofing. | ||
- | root@192.168.2.101===== Authentication in SSH root192.168.2.101 | + | ===== Authentication in SSH ===== |
- | ===== | + | |
SSH servers offer the client a selection of authentication | SSH servers offer the client a selection of authentication | ||
methods. The server advertises what it supports, and the client | methods. The server advertises what it supports, and the client | ||
Line 13: | Line 12: | ||
the option to choose which methods can be used. In WinSCP, you can configure this on [[ui_login_authentication|Login dialog]]. | the option to choose which methods can be used. In WinSCP, you can configure this on [[ui_login_authentication|Login dialog]]. | ||
- | The actual order of authentication methods is as follows: MIT Kerberos GSSAPI 5 (SSH-2 only), [[public key]] (using [[ui_pageant|Pageant]]), [[public key]] (using [[ui_login_session|configured file]]), keyboard-interactive (SSH-2 only), TIS or Cryptocard (SSH-1 only), password.Alpina | + | The actual order of authentication methods is as follows: MIT Kerberos GSSAPI 5 (SSH-2 only), [[public key]] (using [[ui_pageant|Pageant]]), [[public key]] (using [[ui_login_session|configured file]]), keyboard-interactive (SSH-2 only), TIS or Cryptocard (SSH-1 only), password. |
===== Verifying the Host Key ===== | ===== Verifying the Host Key ===== |