Anyway to *NOT* get MITM'ed?

0

There appears to be no way to set the host key, nor to get the host key fingerprint.

At this is the conclusion after multiple frustrating exchanges with support.

Am I missing something here? Is everyone using SFTP just accepting the risk of MITM by the TCP/IP operator?

已提问 5 年前251 查看次数
2 回答
0

When you get a "Man In The Middle" attack message, it's because the IP address of your server endpoint is the same as before, but the host key changed. Is that your case?
Also, you can see the server fingerprint by using the DescribeServer API: https://docs.aws.amazon.com/transfer/latest/userguide/API_DescribeServer.html

AWS
已回答 5 年前
0

Well, I have no way of knowing if I am MITM; i.e. if the traffic is being delivered to the expected identity, since SSH doesn't use PKI like SSL/TLS certs.

Thanks for showing how to get the host key. That answers my question perfectly, particularly since SFTP FAQ says the host key never changes.
I'll let the support rep know :/

已回答 5 年前

您未登录。 登录 发布回答。

一个好的回答可以清楚地解答问题和提供建设性反馈,并能促进提问者的职业发展。

回答问题的准则