Back to product page
- Introduction
- License agreement
- Classes
- Enumerations
- Exceptions
- WeOnlyDo.Client.FtpDLX
- Properties
- Authentication
- Blocking
- BufferSize
- Certificate
- Compression
- DirFormat
- DirItems
- Encryption
- Hostname
- KeepAlive
- LastError
- ListItem
- ListParams
- LocalPath
- Login
- MaxTransferRate
- Passive
- Password
- Port
- PreserveDates
- PrivateKey
- Protocol
- ProxyHostname
- ProxyLogin
- ProxyPassword
- ProxyPort
- ProxyType
- PublicKeyOpenSSH
- PublicKeySSH
- RemotePath
- Resume
- SecureMethod
- SmartGet
- SmartPut
- State
- StrictHost
- Tag
- Timeout
- Timezone
- TransferMode
- TransferRate
- TransferTime
- UseIPv6
- Version
- Methods
- Events
- Properties
- WeOnlyDo.Client.DirItemsCollection
- WeOnlyDo.Client.DirItem
- How to get support?
HostFingerPrintEvent event
Fires when remote SFTP server provides hostkey fingerprint.
Syntax
- C#
- VB.NET
delegate void HostFingerPrintDelegate(object Sender, HostFingerPrintArgs Args);
The HostFingerPrintEvent(Args.Accept,Args.FingerPrint) syntax has these parts:
The HostFingerPrintEvent(Args.Accept,Args.FingerPrint) syntax has these parts:
Args.Accept | Boolean. Determines if you will accept server's hostkey. |
Args.FingerPrint | Byte[] array. Holds server's hostkey fingerprint. |
Delegate Sub HostFingerPrintDelegate(ByVal Sender As Object, ByVal Args As HostFingerPrintArgs)
The HostFingerPrintEvent(Args.Accept,Args.FingerPrint) syntax has these parts:
The HostFingerPrintEvent(Args.Accept,Args.FingerPrint) syntax has these parts:
Args.Accept | Boolean. Determines if you will accept server's hostkey. |
Args.FingerPrint | Byte[] array. Holds server's hostkey fingerprint. |
Remarks
Since SSH2 (and SFTP on it) architecture doesn't know about certificates, or other means of checking if remote server is really the one you intended to connect to, it is a matter of 'trust' if you will accept connection or not.This is how SSH works in real life - once you connect to remote server and you are sure it is really the server you expect it to be, you should store Args.FingerPrint information locally. For each new connection, you should test if FingerPrint information is same as stored one - to be sure that no one is 'in the middle' spying on your connection. FingerPrint information is almost unique among different servers, and it is generated from server's private key.
If you set Args.Accept to True (default), wodFtpDLX will continue to perform negotiation with the server normally. If you set it to False (for instance, because you see that FingerPrint information is not the same as before), it will drop the connection.