You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: doc/fingerprint.rst
+9-6Lines changed: 9 additions & 6 deletions
Original file line number
Diff line number
Diff line change
@@ -14,7 +14,8 @@ In most cases, a new key is automatically generated during installation. When a
14
14
For this reason, the fingerprint must always be compared against a trusted source.
15
15
16
16
17
-
There are SSH clients that have a flawed fingerprint check and are thus vulnerable to man in the middle attacks. An example of this is the SFTP implementation of Midnight Commander. This vulnerability was discovered and fixed only after 9 years. See CVE-2021-36370
17
+
There are SSH clients that have a flawed fingerprint check and are thus vulnerable to man in the middle attacks. An example of this is the SFTP implementation of Midnight Commander.
18
+
This vulnerability was discovered and fixed only after 9 years. See ref:`CVE-2021-36370`
18
19
19
20
However, most programs do not have fingerprint verification vulnerabilities. As long as the fingerprint is checked, it is not possible to connect to an unknown server.
20
21
@@ -245,11 +246,13 @@ Because many users only check the beginning and the end, it is more important th
245
246
246
247
The following example shows a 2-byte fingerprint.
247
248
248
-
+------------------------+---+---+---+---+
249
-
| **Target fingerprint** | 9 | 7 | B | 3 |
250
-
+------------------------+---+---+---+---+
251
-
| **Fuzzy fingerprint | 9 | 1 | E | 3 |
252
-
+------------------------+---+---+---+---+
249
+
+---------------------------------+
250
+
| **Fingerprint Type** |
251
+
+----------------------+----------+
252
+
| Target fingerprint | **5BE4** |
253
+
+----------------------+----------+
254
+
| Fuzzy fingerprint | **5EB4** |
255
+
+----------------------+----------+
253
256
254
257
To improve the fingerprint, similar characters can also be used. Certain characters can be perceived differently by a user or, depending on the character set, can also be confused.
0 commit comments