Differences
This shows you the differences between the selected revisions of the page.
2014-06-13 | 2014-06-13 | ||
verifying the host key section moved to ssh_verifying_the_host_key (martin) | wp>Man-in-the-middle_attack (martin) | ||
Line 15: | Line 15: | ||
===== Verifying the Host Key ===== | ===== Verifying the Host Key ===== | ||
- | To prevent man-in-the-middle attacks, each SSH server has a unique identifying code, called a host key. These keys prevent a server from forging another server's key. If you connect to a server for the first time or if the server presets a different key then previously, WinSCP will prompt you to [[ssh_verifying_the_host_key|verify the key]]. | + | To prevent [[wp>Man-in-the-middle_attack|man-in-the-middle attacks]], each SSH server has a unique identifying code, called a host key. These keys prevent a server from forging another server's key. If you connect to a server for the first time or if the server presets a different key then previously, WinSCP will prompt you to [[ssh_verifying_the_host_key|verify the key]]. |
===== Encryption in SSH ===== | ===== Encryption in SSH ===== |