In the real world, most administrators do not provide the host key fingerprint.
Pre Generated Ssh Host Keys Download
Instead you can ask anyone else who has a physical access to the server or who already knows the host key. The host key is only one and hence the same for all users. Also note that the host key fingerprint is generated from a public key part of the host key only. So it is not secret and can be safely sent over unencrypted (yet trusted) communication channels.
Jun 22, 2012 SSH keys provide a more secure way of logging into a virtual private server with SSH than using a password alone. With SSH keys, users can log into a server without a password. This tutorial explains how to generate, use, and upload an SSH Key Pair. The keys are generated automatically when you install the openssh-server. To manually make a new set of keys, First, delete the old ssh host keys. On the server, sudo rm -f /etc/ssh/sshhost. Then make new keys. Sudo dpkg-reconfigure openssh-server You will see. Creating SSH2 RSA key; this may take some time. Adding your SSH key to the ssh-agent. Before adding a new SSH key to the ssh-agent to manage your keys, you should have checked for existing SSH keys and generated a new SSH key. When adding your SSH key to the agent, use the default macOS ssh-add command, and not an application installed by macports, homebrew, or some other external source.
If you do not have anyone else to obtain the fingerprint from, you may need to connect to the server without knowing the fingerprint. Before connecting for the first time, ensure a security of your local machine and a line to the server. For example if you plan to connect to the server from an external site (e.g. from home or a client), but you have a physical access to the server site, connect from the server site the first time (e.g. your workplace).
Ssh Generate Key Ubuntu
Once you connect, WinSCP caches the fingerprint and will ensure, that the key is unchanged every time you connect later on.
Generating A New Ssh Key
If you need to know the fingerprint later on for other purposes, like to verify the host key on another machine, or for automation, go to a Server and Protocol Information Dialog. See a Server Host key Fingerprint box.