Been having a debate with some friends over how SSH fingerprints work, and am hoping someone can help me figure out the truth.
First of all, how is a fingerprint created? One thing I read said it is a representation of the public key on the server, but I thought it was derived from the server's environment too.
Secondly, I was told that the first time you use SSH, that the fingerprint is still on the server, so you will always get an error stating that the server's IP is unknown. Then after you blindly say "yes", that the fingerprint is transferred over SSH to you local computer and stored in a "known_hosts" file which is created at the time.
I have some more questions, but guess I need to understand how the above two things work first.
Thanks,
Larry
First of all, how is a fingerprint created? One thing I read said it is a representation of the public key on the server, but I thought it was derived from the server's environment too.
Secondly, I was told that the first time you use SSH, that the fingerprint is still on the server, so you will always get an error stating that the server's IP is unknown. Then after you blindly say "yes", that the fingerprint is transferred over SSH to you local computer and stored in a "known_hosts" file which is created at the time.
I have some more questions, but guess I need to understand how the above two things work first.
Thanks,
Larry