`
touchmm
  • 浏览: 1037038 次
  • 性别: Icon_minigender_1
  • 来自: 北京
文章分类
社区版块
存档分类
最新评论

好记心不如烂笔头,ssh登录 The authenticity of host 192.168.0.xxx can't be established. 的问题

阅读更多

用ssh登录一个机器(换过ip地址),提示输入yes后,屏幕不断出现y,只有按ctrl + c结束

错误是:The authenticity of host 192.168.0.xxx can't be established.

以前和同事碰到过这个问题,解决了,没有记录,这次又碰到了不知道怎么处理,还好有QQ聊天记录,查找到一下,找到解决方案:

执行ssh -o StrictHostKeyChecking=no 192.168.0.xxx 就OK

网址是:

http://blog.ossxp.com/2010/04/1026/

记一下,防止又忘记了,又快到3点了,无数个不眠之夜啊。

分享到:
评论

相关推荐

    oracle asm rac

    [root@node1 ~] iscsiadm -m discovery -t st -p 192.168.10.10 (存储地址) 192.168.10.10:3260,1 iqn.2012-09.com.example:server.target4 [root@node1 ~]#iscsiadm -m node -T iqn.2012-09....

    centos6.5配置ssh免秘钥登陆执行pssh命令的讲解

    1.检查并安装pssh,yum list pssh ... [root@bogon ]# pssh -H root@192.168.245.129 ...Stderr: The authenticity of host '192.168.245.129 (192.168.245.129)' can't be established. RSA key fingerprint is 84:2d:70

    如何做到两台Linux机器之间不使用密码即可通过SSH远程登录

    The authenticity of host '192.168.0.195 (192.168.0.195)' can't be established. RSA key fingerprint is 5a:6f:67:d8:4e:0c:3c:20:1a:7f:3e:5b:d0:6e:5d:34. Are you sure you want to continue connecting (yes...

    VMware vsan+ 故障查询+信息状态查询

    The authenticity of host '192.168.11.75' can't be established. Public key fingerprint is 7d11b34956b3f801edfa23347886d60024198ca5c95f9ece164938542700c823. Are you sure you want to continue ...

    关于SSH 远程执行命令你要知道的二三事

    前言 相信大家在工作的时侯,可能会遇到要利用 ssh 在本地执行远程机器的命令可以便捷地处理某些重复工作,我们希望做到: ...The authenticity of host ... can't be established. ECDSA key fingerprint is ... Are

    linux搭建git服务器

    The authenticity of host '192.168.56.101 (192.168.56.101)' can't be established. RSA key fingerprint is SHA256:Ve6WV/SCA059EqoUOzbFoZdfmMh3B259nigfmvdadqQ. Are you sure you want to continue ...

    Linux-SSH服务器实战

    查看SSH是否安装 rpm -qa | grep ssh 没有安装操作 yum install openssh-server ...The authenticity of host '192.168.219.132 (192.168.219.132)' can't be established. ECDSA key fingerprint is

    NIST SP800-89.pdf

    Entities participating in the generation or verification of digital signatures depend on the authenticity of the process. This Recommendation specifies methods for obtaining the assurances necessary ...

    NIST SP800-38C.pdf

    This Recommendation specifies an algorithm, Counter with Cipher Block Chaining-Message Authentication Code [1], abbreviated CCM, that can provide assurance of the confidentiality and authenticity of ...

    NIST SP800-32.pdf

    The individual can then digitally sign data and the recipient can verify the originator of the data and that the data has not been modified without the originator’s knowledge. In addition, the PKI ...

    NIST SP800-53A rev1.pdf

    The selection of appropriate security controls for an information system is an important task that can have major implications on the operations and assets of an organization as well as the welfare ...

    IRM.Press,.Video.Data.Management.and.Information.Retrieval.pdf

    - **Blockchain**: Blockchain technology can be utilized to ensure the integrity and authenticity of video content, particularly in scenarios where tamper-evidence is crucial. #### 5. **Application ...

    TeeChart2013_130818_SourceCode

    shall constitute a breach of this EULA, the effect of which shall be the automatic termination and revocation of all the rights granted herein. 6. Updates/Upgrades. Subject to the terms and ...

    NIST SP800-57pt2r1.pdf

    Cryptographic mechanisms are often used to protect the integrity and confidentiality of data that is sensitive, has a high value, or is vulnerable to unauthorized disclosure or undetected modification...

    NIST SP800-81-2.pdf

    The primary security goals for DNS are data integrity and source authentication, which are needed to ensure the authenticity of domain name information and maintain the integrity of domain name ...

    Python-3.2.3.tar.bz2

    Note: Barry's key id EA5BBD71 is used to sign all Python 2.6 and 3.0 ... To verify the authenticity of the download, grab both files and then run this command: % gpg --verify Python-3.2.3.tgz.asc

    Hootsuite-2021年社交趋势报告(英文)-20212-54页.pdf

    T R E N D 5 | page 49The perils (and promise) of purpose: Bold brands start in the boardroom, not the front lines of social Purpose-driven marketing has become a crucial aspect of brand strategy....

    音视频-直播技术-靠近由体验到画面.pdf

    The powerful force of the spirit is the fundamental support for the existence and artistic tension of an artwork. The short-lived rise and fall of the "Aestheticism" that emphasized form well ...

    我对电视购物的看法(My,view,on,TV,shopping).doc

    One major concern is the issue of product authenticity. Some unscrupulous sellers might offer counterfeit goods, leading to disappointment and frustration for buyers. Additionally, the lack of ...

Global site tag (gtag.js) - Google Analytics