

If the system administrator sends you more than one fingerprint, you should make sure the one PuTTY shows you is on the list, but it doesn't matter which one it is.) (Many servers have more than one host key. If you are connecting across a hostile network (such as the Internet), you should check with your system administrator, perhaps by telephone or in person. If you are connecting within a company network, you might feel that all the network users are on the same side and spoofing attacks are unlikely, so you might choose to trust the key without checking it. Whether or not to trust the host key is your choice. So it gives the warning shown above, and asks you whether you want to trust this host key or not. However, when you connect to a server you have not connected to before, PuTTY has no way of telling whether the host key is the right one or not. If it is not, you will see a warning, and you will have the chance to abandon your connection before you type any private information (such as a password) into it. Every time you connect to a server, it checks that the host key presented by the server is the same host key as it was the last time you connected. It creates a list of known hosts, and the server's key fingerprint is checked against the stored copy every time it establishes a connection.
PUTTY SSH WITH KEY WINDOWS
PuTTY records the host key for each server you connect to, in the Windows Registry. SSH clients, by default, store the key fingerprint of the SSH servers that it has connected to. So if you connect to a server and it sends you a different host key from the one you were expecting, PuTTY can warn you that the server may have been switched and that a spoofing attack might be in progress. These keys are created in a way that prevents one server from forging another server's key. To prevent this attack, each server has a unique identifying code, called a host key.
PUTTY SSH WITH KEY PASSWORD
Using this technique, an attacker would be able to learn the password that guards your login account, and could then log in as if they were you and use the account for their own purposes. It is designed to protect you against a network attack known as spoofing: secretly redirecting your connection to a different computer, so that you send your password to the wrong machine. If you do not trust this host, hit Cancel to abandon the If you want to carry on connecting just once, without If you trust this host, hit Yes to add the key to Have no guarantee that the server is the computer you The server's host key is not cached in the registry. If you are using SSH to connect to a server for the first time, you will probably see a message looking something like this: from the Next Page on Private SSH Key idrsa (PuTTY PPK format) and Enter the passphrase to unlock idrsa for conversion the passphrase is the password that you enter in the step number 4 on this document and click convert ,Then you can copy the contents of the next page and save it on your local computer as ppk file extension and this.

If you are not using the SSH protocol, you can skip this section.

Previous page next page 2.2 Verifying the host key (SSH only)
