标签:详细 相同 att pre 测试 host null eth 解决方法
SSH连接的时候Host key verification failed.
? ~ ssh root@192.168.1.88 @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ @ WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED! @ @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ IT IS POSSIBLE THAT SOMEONE IS DOING SOMETHING NASTY! Someone could be eavesdropping on you right now (man-in-the-middle attack)! It is also possible that a host key has just been changed. The fingerprint for the ECDSA key sent by the remote host is SHA256:LVUSJyjf2eBfUCcdjg0zKmWpLtk5+uF9OGrXXqcZ4PU. Please contact your system administrator. Add correct host key in /Users/guanbinbin/.ssh/known_hosts to get rid of this message. Offending ECDSA key in /Users/guanbinbin/.ssh/known_hosts:93 ECDSA host key for 192.168.1.88 has changed and you have requested strict checking. Host key verification failed.
StrictHostKeyChecking变量来配置的。默认情况下,
StrictHostKeyChecking=ask。简单所下它的三种配置值:
1.
StrictHostKeyChecking=no
#最不安全的级别,当然也没有那么多烦人的提示了,相对安全的内网时建议使用。如果连接server的key在本地不存在,那么就自动添加到文件中(默认是known_hosts),并且给出一个警告。
2.
StrictHostKeyChecking=ask #默认的级别,就是出现刚才的提示了。如果连接和key不匹配,给出提示,并拒绝登录。
3.
StrictHostKeyChecking=yes #
最安全的级别,如果连接与key不匹配,就拒绝连接,不会提示详细信息。对于我来说,在内网的进行的一些测试,为了方便,选择最低的安全级别。在.ssh/config(或者/etc/ssh/ssh_config)中配置:
StrictHostKeyChecking no UserKnownHostsFile /dev/null
vi ~/.ssh/known_hosts
删除对应ip的相关rsa信息
rm known_hosts
ssh中“Host key verification failed.“的解决方案
标签:详细 相同 att pre 测试 host null eth 解决方法
原文地址:https://www.cnblogs.com/guanbin-529/p/11693048.html