Portál AbcLinuxu, 26. dubna 2024 13:37
ssh -o StrictHostKeyChecking=no IP_ADRESA
?
mrmh:/home/johny# ssh -o StrictHostKeyChecking=no 10.55.72.51 @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ @ WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED! @ @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ IT IS POSSIBLE THAT SOMEONE IS DOING SOMETHING NASTY! Someone could be eavesdropping on you right now (man-in-the-middle attack)! It is also possible that the RSA host key has just been changed. The fingerprint for the RSA key sent by the remote host is 1b:39:04:ab:4b:b9:93:65:bf:46:58:28:31:fa:fa:27. Please contact your system administrator. Add correct host key in /root/.ssh/known_hosts to get rid of this message. Offending key in /root/.ssh/known_hosts:1 Password authentication is disabled to avoid man-in-the-middle attacks. Keyboard-interactive authentication is disabled to avoid man-in-the-middle attacks. Permission denied (publickey,keyboard-interactive).takže asi to nebude ono :(
Jan Kasprzak wrote: : : A nebo proste -oUserKnownHostsFile=/dev/null a on nove zjisteny klic : : zapise do /dev/null, tedy ihned zapomene. Jakkoli to muze znit prekvapive, : : tak to funguje. : : Tohle asi bude ono, doufam ze to jde dat do ssh_config do sekce : pro jednoho Hosta. Vracim se ke starsimu threadu - dneska jsem to zase potreboval, a opravdu jsem vyzkousel, ze Host testovaci UserKnownHostsFile /dev/null do ~/.ssh/config opravdu funguje. -Y.
Tiskni Sdílej:
ISSN 1214-1267, (c) 1999-2007 Stickfish s.r.o.