Back to product page
- Introduction
- Overview
- License Agrement
- Getting Started
- Objects
- Enumerations
- wodSSH
- Methods
- Properties
- AllocatePty
- Authentication
- Blocking
- ClientName
- Columns
- Command
- Compression
- DataOut
- DataReady
- Encoding
- Encryption
- EncryptionList
- ErrorText
- ExitSignal
- ExitStatus
- FIPS
- ForwardHost
- ForwardPort
- HMacList
- Hostname
- KeepAlives
- KeyExchangeList
- KeyForward
- KeySignatureList
- LastError
- Login
- MyHostname
- MyIP
- Notification
- Password
- Port
- PrivateKey
- Prompt
- Protocol
- ProxyHostname
- ProxyLogin
- ProxyPassword
- ProxyPort
- ProxyType
- RemoteIdentification
- Rows
- ShowStdErrorMessages
- State
- StateText
- StripANSI
- StripNull
- Subsystem
- TerminalSpeed
- TerminalType
- Timeout
- UseIPv6
- Version
- Events
- IwodSSHNotify
- How to get support?
- Technical information
- Fast notifications interface
- Error list
HostFingerprint event
Fires when the remote server provides public key fingerprint information.
Syntax
- Basic
Private Sub object_HostFingerprint(Fingerprint, Accept)
The HostFingerprint(object,Fingerprint,Accept) syntax has these parts:
The HostFingerprint(object,Fingerprint,Accept) syntax has these parts:
object | A wodSSH object. |
Fingerprint | A String value. Represents the remote server fingerprint. |
Accept | A Boolean value. When set to False, wodSSH will abort the connection. |
Remarks
This event can be fired only for SSH protocols. Since the SSH architecture doesn't know about certificates or any other means of checking if the remote server is really the one you intended to connect to, whether you will accept a connection or not is a matter of 'trust'.This is how SSH works in real life - once you connect to the remote server and you are sure it is really the server you expect it to be, you should store Fingerprint information locally. For each new connection, you should test if the new Fingerprint information is same as the stored Fingerprint - to be sure that no one is 'in the middle' spying on your connection. Fingerprint information is almost unique among different server and it is generated from a server's private key.
If you set Accept to True (default), wodSSH will continue to perform negotiation with the server normally. If you set it to False (for instance, because you see that Fingerprint information is not the same as before), it will drop the connection.
Even if you connect to the same server, different protocol versions will produce different Fingerprint information. So, if you use SSH1 and store fingerprint information and then later you use SSH2, you will see this information is different. This is to be expected. You should store new information also.