Guest User

Untitled

a guest
Apr 25th, 2018
55
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 1.47 KB | None | 0 0
  1. RSA key fingerprint is 96:a9:23:5c:cc:d1:0a:d4:70:22:93:e9:9e:1e:74:2f.
  2. Are you sure you want to continue connecting (yes/no)? yes
  3.  
  4. ssh -o StrictHostKeyChecking=no -l $user $host
  5.  
  6. StrictHostKeyChecking
  7. If this flag is set to “yes”, ssh will never automatically add
  8. host keys to the $HOME/.ssh/known_hosts file, and refuses to
  9. connect to hosts whose host key has changed. This provides max-
  10. imum protection against trojan horse attacks, however, can be
  11. annoying when the /etc/ssh/ssh_known_hosts file is poorly main-
  12. tained, or connections to new hosts are frequently made. This
  13. option forces the user to manually add all new hosts. If this
  14. flag is set to “no”, ssh will automatically add new host keys to
  15. the user known hosts files. If this flag is set to “ask”, new
  16. host keys will be added to the user known host files only after
  17. the user has confirmed that is what they really want to do, and
  18. ssh will refuse to connect to hosts whose host key has changed.
  19. The host keys of known hosts will be verified automatically in
  20. all cases. The argument must be “yes”, “no” or “ask”. The
  21. default is “ask”.
  22.  
  23. ssh-keyscan host1 host2 host3 host4
  24.  
  25. cat ~/.ssh/known_hosts
  26. echo "$SERVER,$PORT ssh-rsa $SERVER_KEY_FINGERPRINT" >> ~/.ssh/known_hosts
  27.  
  28. ssh -oStrictHostKeyChecking=no -oUserKnownHostsFile=/dev/null user@example.net
Add Comment
Please, Sign In to add comment