cc_staff
3
edits
(Marked this version for translation) |
(We publish host key fingerprints and not the host keys themselves.) |
||
Line 51: | Line 51: | ||
<!--T:10--> | <!--T:10--> | ||
The last of these error messages can point to a man-in-the-middle attack, or to an upgrade of security of the cluster you are trying to connect to. | The last of these error messages can point to a man-in-the-middle attack, or to an upgrade of security of the cluster you are trying to connect to. | ||
If you get this, verify that the host key mentioned in the message matches one of the host | If you get this, verify that the host key fingerprint mentioned in the message matches one of the host key fingerprints published at [[SSH host keys]]. | ||
If it does, it is safe to continue connecting. If the host key does not appear on our published list, terminate the connection and [[Technical support|contact support]]. | If it does, it is safe to continue connecting. If the host key fingerprint does not appear on our published list, terminate the connection and [[Technical support|contact support]]. | ||
<!--T:14--> | <!--T:14--> |