Posts

Showing posts from May, 2014

Solution for RSA Host Key verification failed

Image
When making an SSH connection to a machine we've never contacted before, The server presented its host key to the client as part of the initial handshake. On Client when you said 'yes', SSH client saves the server's host key locally in the file $HOME/.ssh/known_hosts. for root user location is /root/.ssh/known_hosts.This file is, effectively, your personal Certificate Authority -- it is the list of all SSH server The next time you connect to this machine, your SSH client will go through the standard steps of verifying the remote machine and allowing you to log in, this time, it did not ask you to verify the key fingerprint at all. That's because the key was in your $HOME/.ssh/known_hosts file. The SSH client actually checks in a few places: The global known hosts file, typically /etc/ssh/ssh_known_hosts. This can be modified by changing the GlobalKnownHostsFile parameter in the ssh configuration file (typically /etc/ssh/ssh_config). The user's known hosts