Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- RSA key fingerprint is 96:a9:23:5c:cc:d1:0a:d4:70:22:93:e9:9e:1e:74:2f.
- Are you sure you want to continue connecting (yes/no)? yes
- ssh -o StrictHostKeyChecking=no -l $user $host
- StrictHostKeyChecking
- If this flag is set to “yes”, ssh will never automatically add
- host keys to the $HOME/.ssh/known_hosts file, and refuses to
- connect to hosts whose host key has changed. This provides max-
- imum protection against trojan horse attacks, however, can be
- annoying when the /etc/ssh/ssh_known_hosts file is poorly main-
- tained, or connections to new hosts are frequently made. This
- option forces the user to manually add all new hosts. If this
- flag is set to “no”, ssh will automatically add new host keys to
- the user known hosts files. If this flag is set to “ask”, new
- host keys will be added to the user known host files only after
- the user has confirmed that is what they really want to do, and
- ssh will refuse to connect to hosts whose host key has changed.
- The host keys of known hosts will be verified automatically in
- all cases. The argument must be “yes”, “no” or “ask”. The
- default is “ask”.
- ssh-keyscan host1 host2 host3 host4
- cat ~/.ssh/known_hosts
- echo "$SERVER,$PORT ssh-rsa $SERVER_KEY_FINGERPRINT" >> ~/.ssh/known_hosts
- ssh -oStrictHostKeyChecking=no -oUserKnownHostsFile=/dev/null user@example.net
Add Comment
Please, Sign In to add comment