Differences
This shows you the differences between the selected revisions of the page.
2013-12-20 | 2014-03-03 | ||
5.5 no pages on login dialog (martin) | key size should be 2048 bit at least nowadays (martin) | ||
Line 20: | Line 20: | ||
server is the computer you think it is. | server is the computer you think it is. | ||
The server's rsa2 key fingerprint is: | The server's rsa2 key fingerprint is: | ||
- | ssh-rsa 1024 94:3c:9e:2b:23:df:bd:53:b4:ad:f1:5f:4e:2f:9d:ba | + | ssh-rsa 2048 94:3c:9e:2b:23:df:bd:53:b4:ad:f1:5f:4e:2f:9d:ba |
This is a feature of the SSH protocol. It is designed to protect you against a network attack known as spoofing: secretly redirecting your connection to a different computer, so that you send your password to the wrong machine. Using this technique, an attacker would be able to learn the password that guards your login account, and could then log in as if they were you and use the account for their own purposes. | This is a feature of the SSH protocol. It is designed to protect you against a network attack known as spoofing: secretly redirecting your connection to a different computer, so that you send your password to the wrong machine. Using this technique, an attacker would be able to learn the password that guards your login account, and could then log in as if they were you and use the account for their own purposes. |