SSH: Difference between revisions

Jump to navigation Jump to search
We publish host key fingerprints and not the host keys themselves.
(Marked this version for translation)
(We publish host key fingerprints and not the host keys themselves.)
Line 51: Line 51:
<!--T:10-->
<!--T:10-->
The last of these error messages can point to a man-in-the-middle attack, or to an upgrade of security of the cluster you are trying to connect to.
The last of these error messages can point to a man-in-the-middle attack, or to an upgrade of security of the cluster you are trying to connect to.
If you get this, verify that the host key mentioned in the message matches one of the host keys published at [[SSH host keys]].
If you get this, verify that the host key fingerprint mentioned in the message matches one of the host key fingerprints published at [[SSH host keys]].
If it does, it is safe to continue connecting.  If the host key does not appear on our published list, terminate the connection and [[Technical support|contact support]].
If it does, it is safe to continue connecting.  If the host key fingerprint does not appear on our published list, terminate the connection and [[Technical support|contact support]].


<!--T:14-->
<!--T:14-->
cc_staff
3

edits

Navigation menu