Question about ssh fingerprint
I must not understand this right.
From my understanding, the SSH fingerprint is to ensure the server you are connecting to is the server you are expecting. According to the FAQ, "The host key fingerprint is generated from public key part of the hostkey only. So it is not secret and can be safely sent over insecure communication channels."
Wouldn't a man in the middle attack be possible if the attacker knew the SSH fingerprint? Couldn't he use the same SSH fingerprint on his machine to fool you into thinking his is the right server?
From my understanding, the SSH fingerprint is to ensure the server you are connecting to is the server you are expecting. According to the FAQ, "The host key fingerprint is generated from public key part of the hostkey only. So it is not secret and can be safely sent over insecure communication channels."
Wouldn't a man in the middle attack be possible if the attacker knew the SSH fingerprint? Couldn't he use the same SSH fingerprint on his machine to fool you into thinking his is the right server?