In this tutorial, you have learned, how to disable strict host key check during ssh key connection to a remote host. You have successfully disabled the strict host key checking in SSH. Copy the whole line verbatim to the file as a single line. You find the new public key on your local machine using cat /.ssh/new-key.pub. Host 192.168.1.10Īlso, set the proper permissions on the file to make it read-only for the user. To delete a line in nano, simply press Ctrl + K. Rather than disabling host check for all Host “*”, it would be safer to specify a particular host.
This will disable host checking for all hosts you connect to. You need to create a ~/.ssh/config file and disable strict host key checking by adding the content. You can also define the strings to disable host key checking in the configuration file. ssh -o StrictHostKe圜hecking=no Using Config File You can define the StrictHostKe圜hecking=no command line argument to ssh command to skip the host key checking. Continue to read this article to understand the way to disable strict host check in the SSH clients on Linux systems. On most Linux distros it can be found under root/.ssh/knownhosts or /. RSA key fingerprint is 9f:48:89:f5:68:2f:cd:b3:19:95:40:43:98:09:0a:1a.Īre you sure you want to continue connecting (yes/no)?īut in some situations, like shell scripts, we need to disable the strict host check. At this point we would normally head over to our knowhosts file and delete the entry, either by using vim, nano or a GUI text editor on our local machine. The authenticity of host 'remote-host (123.45.67.89)' can't be established.