![]() (See section 10.2 for what that looks like.) If it is not, you will see a stronger warning, and you will have the chance to abandon your connection before you type any private information (such as a password) into it. Every time you connect to a server, it checks that the host key presented by the server is the same host key as it was the last time you connected. PuTTY records the host key for each server you connect to, in the Windows Registry. So if you connect to a server and it sends you a different host key from the one you were expecting, PuTTY can warn you that the server may have been switched and that a spoofing attack might be in progress. These keys are created in a way that prevents one server from forging another server's key. To prevent this attack, each server has a unique identifying code, called a host key. Using this technique, an attacker would be able to learn the password that guards your login account, and could then log in as if they were you and use the account for their own purposes. It is designed to protect you against a network attack known as spoofing: secretly redirecting your connection to a different computer, so that you send your password to the wrong machine. If you do not trust this host, press "Cancel" to abandon the connection. If you want to carry on connecting just once, without adding the key If you trust this host, press "Accept" to add the key to PuTTY's The server's ssh-ed25519 key fingerprint is: You have no guarantee that the server is the computer you think it is. If you are using SSH to connect to a server for the first time, you will probably see a message looking something like this: The host key is not cached for this server: If you are not using the SSH protocol, you can skip this section. Press the «Open» button at the bottom of the dialog box, and PuTTY will begin trying to connect you to the server. Once you have filled in the «Host Name», «Connection type», and possibly «Port» settings, you are ready to connect. (For example, many MUDs run Telnet service on a port other than 23.) If your server provides login services on a non-standard port, your system administrator should have told you which one. Most servers will use the standard port numbers, so you will not need to change the port setting. This is normal: it happens because the various login services are usually provided on different network ports by the server machine. When you change the selected protocol, the number in the «Port» box will change. The Serial option is used for connecting to a local serial line, and works somewhat differently: see section 3.6 for more information on this. The Raw protocol is not used for interactive login sessions you would usually use this for debugging other Internet services (see section 3.7). See section 1.2 for a description of the differences between these protocols, and advice on which one to use. For a login session, you should select SSH, Telnet, Rlogin, or SUPDUP. Now select a login protocol to use, from the «Connection type» controls. You should have been told this by the provider of your login account. In the «Host Name» box, enter the Internet host name of the server you want to connect to. To start the simplest kind of session, all you need to do is to enter a few basic parameters. You don't usually need to change most of the configuration options. See глава 4 for details of all the things you can control. ![]() This dialog box allows you to control everything PuTTY can do. When you start PuTTY, you will see a dialog box. This chapter gives a quick guide to the simplest types of interactive login session using PuTTY.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |