SSH connection problem with “Host key verification failed…” error





.everyoneloves__top-leaderboard:empty,.everyoneloves__mid-leaderboard:empty,.everyoneloves__bot-mid-leaderboard:empty{ margin-bottom:0;
}







164















I can connect to another Ubuntu machine in my LAN via SSH. On both of then PC's I installed openssh-server
but from another Ubuntu computer I can not connect to my PC via SSH and I got this error:




Host key verification failed...











share|improve this question















migrated from stackoverflow.com May 28 '11 at 12:38


This question came from our site for professional and enthusiast programmers.














  • 1





    Dó you use host names or IP-addresses?

    – Thorbjørn Ravn Andersen
    May 27 '12 at 13:21











  • Not similar but I got the same error but due to a different problem: serverfault.com/questions/494916/…

    – zengr
    Aug 28 '13 at 19:18











  • This is not an Ubuntu-specific issue. Can happen with any ssh from the command-line.

    – MarkHu
    Mar 31 '17 at 17:19


















164















I can connect to another Ubuntu machine in my LAN via SSH. On both of then PC's I installed openssh-server
but from another Ubuntu computer I can not connect to my PC via SSH and I got this error:




Host key verification failed...











share|improve this question















migrated from stackoverflow.com May 28 '11 at 12:38


This question came from our site for professional and enthusiast programmers.














  • 1





    Dó you use host names or IP-addresses?

    – Thorbjørn Ravn Andersen
    May 27 '12 at 13:21











  • Not similar but I got the same error but due to a different problem: serverfault.com/questions/494916/…

    – zengr
    Aug 28 '13 at 19:18











  • This is not an Ubuntu-specific issue. Can happen with any ssh from the command-line.

    – MarkHu
    Mar 31 '17 at 17:19














164












164








164


41






I can connect to another Ubuntu machine in my LAN via SSH. On both of then PC's I installed openssh-server
but from another Ubuntu computer I can not connect to my PC via SSH and I got this error:




Host key verification failed...











share|improve this question
















I can connect to another Ubuntu machine in my LAN via SSH. On both of then PC's I installed openssh-server
but from another Ubuntu computer I can not connect to my PC via SSH and I got this error:




Host key verification failed...








ssh






share|improve this question















share|improve this question













share|improve this question




share|improve this question








edited Mar 13 '16 at 16:11









techraf

2,78592035




2,78592035










asked May 28 '11 at 11:36









NavidNavid

978287




978287




migrated from stackoverflow.com May 28 '11 at 12:38


This question came from our site for professional and enthusiast programmers.









migrated from stackoverflow.com May 28 '11 at 12:38


This question came from our site for professional and enthusiast programmers.










  • 1





    Dó you use host names or IP-addresses?

    – Thorbjørn Ravn Andersen
    May 27 '12 at 13:21











  • Not similar but I got the same error but due to a different problem: serverfault.com/questions/494916/…

    – zengr
    Aug 28 '13 at 19:18











  • This is not an Ubuntu-specific issue. Can happen with any ssh from the command-line.

    – MarkHu
    Mar 31 '17 at 17:19














  • 1





    Dó you use host names or IP-addresses?

    – Thorbjørn Ravn Andersen
    May 27 '12 at 13:21











  • Not similar but I got the same error but due to a different problem: serverfault.com/questions/494916/…

    – zengr
    Aug 28 '13 at 19:18











  • This is not an Ubuntu-specific issue. Can happen with any ssh from the command-line.

    – MarkHu
    Mar 31 '17 at 17:19








1




1





Dó you use host names or IP-addresses?

– Thorbjørn Ravn Andersen
May 27 '12 at 13:21





Dó you use host names or IP-addresses?

– Thorbjørn Ravn Andersen
May 27 '12 at 13:21













Not similar but I got the same error but due to a different problem: serverfault.com/questions/494916/…

– zengr
Aug 28 '13 at 19:18





Not similar but I got the same error but due to a different problem: serverfault.com/questions/494916/…

– zengr
Aug 28 '13 at 19:18













This is not an Ubuntu-specific issue. Can happen with any ssh from the command-line.

– MarkHu
Mar 31 '17 at 17:19





This is not an Ubuntu-specific issue. Can happen with any ssh from the command-line.

– MarkHu
Mar 31 '17 at 17:19










15 Answers
15






active

oldest

votes


















191














"Host key verification failed" means that the host key of the remote host was changed.



SSH stores the host keys of the remote hosts in ~/.ssh/known_hosts. You can either edit that text file manually and remove the old key (you can see the line number in the error message), or use



ssh-keygen -R hostname


(which I learned from the answer to
Is it possible to remove a particular host key from SSH's known_hosts file?).






share|improve this answer





















  • 3





    It can also mean that you simply don't have the host key of the remote host. For example, if I rm ~/.ssh/*, then ssh -o BatchMode=yes root@somewhere, if nothing else is wrong I will get Host key verification failed. Not important if you're always interactive, but relevant for scripts encountering the same error.

    – Ron Burk
    Apr 25 '17 at 23:19











  • Unsurprisingly, ssh-keygen -R example.net:7999 yields Host example.net:7999 not found in known_hosts.

    – alex
    Feb 12 '18 at 18:35











  • I removed known_hosts file and ssh again. It worked.

    – ParisaN
    Jun 6 '18 at 10:49



















117














If you are running in certain remote/scripting situations where you lack interactive access to the prompt-to-add-hostkey, work around it like this:



$ ssh -o StrictHostKeyChecking=no user@something.example.com uptime


Warning: Permanently added 'something.example.com,10.11.12.13' (RSA) to the list of known hosts.






share|improve this answer





















  • 6





    +1, this is an ugly solution, but in some cases of automated monitoring processes that work with dymaic ip-connected devices, this is a simple and acceptable solution.

    – Ninsuo
    Nov 11 '13 at 14:34






  • 11





    +1 For example, for Jenkins executions, this is a good solution. Thanks

    – Lobo
    Feb 5 '15 at 10:02






  • 5





    @Lobo can't agree more, i am using it for jenkins, which is cool sh """ssh -o StrictHostKeyChecking=No ec2-user@someIpAddress-e2e sudo service tomcat restart"""

    – prayagupd
    Jun 8 '17 at 21:40











  • Saved My Life. Life saver solution.

    – user1735921
    Oct 12 '17 at 6:43



















10














Also sometimes there is situation when you are working on serial console, then checking above command in verbose mode -v will show you /dev/tty does not exist, while it does.



ssh -v user@hostname


In above case just remove /dev/tty and create a symlink of /dev/ttyS0 to /dev/tty.



rm /dev/tty
ln -s /dev/ttyS0 /dev/tty


As an alternative, add id_rsa.pub to the remote location, so password is not prompted and you get login access.






share|improve this answer





















  • 6





    +1 for advising to use -v parameter; this can help a lot when debugging ssh problems.

    – daniel kullmann
    Jul 24 '12 at 19:10



















8














In my case, this was caused by a udev problem - there was no /dev/tty device node. The solution for me was just:



sudo mknod -m 666 /dev/tty c 5 0





share|improve this answer

































    6














    On terminal:



    ssh -o StrictHostKeyChecking=No -i YourPublicKey.pem user@example.com uptime


    The following message, or similar, will appear:



    Warning: Permanently added 'example.com, XX.XXX.XXX.XX' (ECDSA) to the list of known hosts.
    00:47:37 up 3 min, 0 users, load average: 0.00, 0.00, 0.00


    Then, connect to your EC2 as normal:



    ssh -i YourPublickey.pem user@example.com





    share|improve this answer
























    • I got command-line line 0: Bad yes/no/ask argument. because you wrongly use 'No' instead of 'no' as argument to StrictHostKeyChecking

      – Axel Bregnsbo
      Aug 25 '18 at 15:30



















    3














    Well, it simply because the second ubuntu requires connection by key and not password.



    I suggest you use sudo dpkg-reconfigure openssh-server on your pc, and then it should work properly. It will reset the configuration for openssh and should come back to a default password authentication.



    Second possibility is that there's already a key for your other ubuntu in you PC, and that it changed thus being not recognized anymore. In this case, you'll have to edit the file .ssh/authorized_keys to remove the problematic line identifying your ubuntu.






    share|improve this answer































      3














      This is an old thread and I just ran across this answer, I will just add what I did to solve this.



      ssh-keygen -f "/home/USER/.ssh/known_hosts" -R HOSTNAME


      I just looked at the error message that it threw at me and it said to run that command in order to remove it from the list of hosts. After that I did the following:



      ssh-copy-id HOSTNAME


      Than I followed the prompts from there until I was able to ssh into the server.






      share|improve this answer
























      • As this command I am getting as suggestion in ubuntu 12.4.

        – MaNKuR
        May 31 '15 at 18:09



















      2














      Its means your remote host key was changed (May be host password change),



      Your terminal suggested to execute this command as root user



      $ ssh-keygen -f "/root/.ssh/known_hosts" -R [www.website.net]:4231


      You have to remove that host name from hosts list on your pc/server. Copy that suggested command and execute as a root user.



      $ sudo su                                                            // Login as a root user

      $ ssh-keygen -f "/root/.ssh/known_hosts" -R [www.website.net]:4231 // Terminal suggested command execute here
      Host [www.website.net]:4231 found: line 16 type ECDSA
      /root/.ssh/known_hosts updated.
      Original contents retained as /root/.ssh/known_hosts.old

      $ exit // Exist from root user

      $ sudo ssh root@www.website.net -p 4231 // Try again


      Hope this works.






      share|improve this answer































        1














        You should change your key in this way:
        From your given error find which host-key changed for
        example: Offending ECDSA key in /Users/user-name/.ssh/known_hosts:5
        said 5th key changed, so do this:



        sed -i '5d' ~/.ssh/known_hosts


        Notice: you must be root or have privilege for sudo.






        share|improve this answer
























        • No, unless you are doing it for someone else, it does not require root nor sudo. You are editing the file in your home directory. Second: for the command to work it requires GNU sed.

          – techraf
          Mar 13 '16 at 16:00











        • Maybe you right but I tried to ssh from Mac OSX to ubuntu-server and I have to do that. by the way thank you for your comment.

          – Amir.A.G
          Mar 14 '16 at 16:44





















        1














        you have to put the rsa key of the target host into the source host /home/user/.ssh/known_hosts by running this on the target



        ssh-keyscan -t rsa @targethost





        share|improve this answer

































          1














          May you just need to enter "yes" when ssh confirm you want to continue connectting.



          Like bellow.



          The authenticity of host 'xxx' can't be established.
          ECDSA key fingerprint is yyy.
          Are you sure you want to continue connecting (yes/no)? yes
          Warning: Permanently added 'xxx' (ECDSA) to the list of known hosts.
          Enter passphrase for key '/Users/ysy/.ssh/id_rsa':


          Then enter your password.



          Please pay attention to "Are you sure you want to continue connecting (yes/no)? yes". You must enter yes, not enter.






          share|improve this answer































            0














            pico ~/.ssh/known_hosts and delete all lines, after just reconnect and you will get a new key.






            share|improve this answer





















            • 5





              This is a dangerous solution, because you will remove ALL your host keys. The accepted solution, ssh-keygen -R hostname is better.

              – msanford
              Mar 24 '14 at 20:52



















            0














            My solution comes from this blog post: Algorithm negotiation failed for SSH Secure Shell Client



            You need to modify the file as follows:



            sudo nano /etc/ssh/sshd_config


            And then add the following:



            # Ciphers
            Ciphers aes128-cbc,aes192-cbc,aes256-cbc,blowfish-cbc,arcfour
            KexAlgorithms diffie-hellman-group1-sha1


            Basically you tried different solutions until you find one which can solve your problem. If the above solutions don't work, please try this one. If this one doesn't work as well, please try others.






            share|improve this answer

































              0














              Just disable strict host key checking in your ~/.ssh/config:



              Host *
              StrictHostKeyChecking no





              share|improve this answer































                -1














                chmod 666 /dev/tty 


                is yet another tty solution - sometimes, this device file has wrong permissions.






                share|improve this answer










                New contributor




                Alex is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
                Check out our Code of Conduct.





















                  Your Answer








                  StackExchange.ready(function() {
                  var channelOptions = {
                  tags: "".split(" "),
                  id: "89"
                  };
                  initTagRenderer("".split(" "), "".split(" "), channelOptions);

                  StackExchange.using("externalEditor", function() {
                  // Have to fire editor after snippets, if snippets enabled
                  if (StackExchange.settings.snippets.snippetsEnabled) {
                  StackExchange.using("snippets", function() {
                  createEditor();
                  });
                  }
                  else {
                  createEditor();
                  }
                  });

                  function createEditor() {
                  StackExchange.prepareEditor({
                  heartbeatType: 'answer',
                  autoActivateHeartbeat: false,
                  convertImagesToLinks: true,
                  noModals: true,
                  showLowRepImageUploadWarning: true,
                  reputationToPostImages: 10,
                  bindNavPrevention: true,
                  postfix: "",
                  imageUploader: {
                  brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
                  contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
                  allowUrls: true
                  },
                  onDemand: true,
                  discardSelector: ".discard-answer"
                  ,immediatelyShowMarkdownHelp:true
                  });


                  }
                  });














                  draft saved

                  draft discarded


















                  StackExchange.ready(
                  function () {
                  StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2faskubuntu.com%2fquestions%2f45679%2fssh-connection-problem-with-host-key-verification-failed-error%23new-answer', 'question_page');
                  }
                  );

                  Post as a guest















                  Required, but never shown

























                  15 Answers
                  15






                  active

                  oldest

                  votes








                  15 Answers
                  15






                  active

                  oldest

                  votes









                  active

                  oldest

                  votes






                  active

                  oldest

                  votes









                  191














                  "Host key verification failed" means that the host key of the remote host was changed.



                  SSH stores the host keys of the remote hosts in ~/.ssh/known_hosts. You can either edit that text file manually and remove the old key (you can see the line number in the error message), or use



                  ssh-keygen -R hostname


                  (which I learned from the answer to
                  Is it possible to remove a particular host key from SSH's known_hosts file?).






                  share|improve this answer





















                  • 3





                    It can also mean that you simply don't have the host key of the remote host. For example, if I rm ~/.ssh/*, then ssh -o BatchMode=yes root@somewhere, if nothing else is wrong I will get Host key verification failed. Not important if you're always interactive, but relevant for scripts encountering the same error.

                    – Ron Burk
                    Apr 25 '17 at 23:19











                  • Unsurprisingly, ssh-keygen -R example.net:7999 yields Host example.net:7999 not found in known_hosts.

                    – alex
                    Feb 12 '18 at 18:35











                  • I removed known_hosts file and ssh again. It worked.

                    – ParisaN
                    Jun 6 '18 at 10:49
















                  191














                  "Host key verification failed" means that the host key of the remote host was changed.



                  SSH stores the host keys of the remote hosts in ~/.ssh/known_hosts. You can either edit that text file manually and remove the old key (you can see the line number in the error message), or use



                  ssh-keygen -R hostname


                  (which I learned from the answer to
                  Is it possible to remove a particular host key from SSH's known_hosts file?).






                  share|improve this answer





















                  • 3





                    It can also mean that you simply don't have the host key of the remote host. For example, if I rm ~/.ssh/*, then ssh -o BatchMode=yes root@somewhere, if nothing else is wrong I will get Host key verification failed. Not important if you're always interactive, but relevant for scripts encountering the same error.

                    – Ron Burk
                    Apr 25 '17 at 23:19











                  • Unsurprisingly, ssh-keygen -R example.net:7999 yields Host example.net:7999 not found in known_hosts.

                    – alex
                    Feb 12 '18 at 18:35











                  • I removed known_hosts file and ssh again. It worked.

                    – ParisaN
                    Jun 6 '18 at 10:49














                  191












                  191








                  191







                  "Host key verification failed" means that the host key of the remote host was changed.



                  SSH stores the host keys of the remote hosts in ~/.ssh/known_hosts. You can either edit that text file manually and remove the old key (you can see the line number in the error message), or use



                  ssh-keygen -R hostname


                  (which I learned from the answer to
                  Is it possible to remove a particular host key from SSH's known_hosts file?).






                  share|improve this answer















                  "Host key verification failed" means that the host key of the remote host was changed.



                  SSH stores the host keys of the remote hosts in ~/.ssh/known_hosts. You can either edit that text file manually and remove the old key (you can see the line number in the error message), or use



                  ssh-keygen -R hostname


                  (which I learned from the answer to
                  Is it possible to remove a particular host key from SSH's known_hosts file?).







                  share|improve this answer














                  share|improve this answer



                  share|improve this answer








                  edited Jan 9 '18 at 19:36









                  slm

                  2,01811826




                  2,01811826










                  answered May 28 '11 at 13:19









                  elmichaelmicha

                  7,08522439




                  7,08522439








                  • 3





                    It can also mean that you simply don't have the host key of the remote host. For example, if I rm ~/.ssh/*, then ssh -o BatchMode=yes root@somewhere, if nothing else is wrong I will get Host key verification failed. Not important if you're always interactive, but relevant for scripts encountering the same error.

                    – Ron Burk
                    Apr 25 '17 at 23:19











                  • Unsurprisingly, ssh-keygen -R example.net:7999 yields Host example.net:7999 not found in known_hosts.

                    – alex
                    Feb 12 '18 at 18:35











                  • I removed known_hosts file and ssh again. It worked.

                    – ParisaN
                    Jun 6 '18 at 10:49














                  • 3





                    It can also mean that you simply don't have the host key of the remote host. For example, if I rm ~/.ssh/*, then ssh -o BatchMode=yes root@somewhere, if nothing else is wrong I will get Host key verification failed. Not important if you're always interactive, but relevant for scripts encountering the same error.

                    – Ron Burk
                    Apr 25 '17 at 23:19











                  • Unsurprisingly, ssh-keygen -R example.net:7999 yields Host example.net:7999 not found in known_hosts.

                    – alex
                    Feb 12 '18 at 18:35











                  • I removed known_hosts file and ssh again. It worked.

                    – ParisaN
                    Jun 6 '18 at 10:49








                  3




                  3





                  It can also mean that you simply don't have the host key of the remote host. For example, if I rm ~/.ssh/*, then ssh -o BatchMode=yes root@somewhere, if nothing else is wrong I will get Host key verification failed. Not important if you're always interactive, but relevant for scripts encountering the same error.

                  – Ron Burk
                  Apr 25 '17 at 23:19





                  It can also mean that you simply don't have the host key of the remote host. For example, if I rm ~/.ssh/*, then ssh -o BatchMode=yes root@somewhere, if nothing else is wrong I will get Host key verification failed. Not important if you're always interactive, but relevant for scripts encountering the same error.

                  – Ron Burk
                  Apr 25 '17 at 23:19













                  Unsurprisingly, ssh-keygen -R example.net:7999 yields Host example.net:7999 not found in known_hosts.

                  – alex
                  Feb 12 '18 at 18:35





                  Unsurprisingly, ssh-keygen -R example.net:7999 yields Host example.net:7999 not found in known_hosts.

                  – alex
                  Feb 12 '18 at 18:35













                  I removed known_hosts file and ssh again. It worked.

                  – ParisaN
                  Jun 6 '18 at 10:49





                  I removed known_hosts file and ssh again. It worked.

                  – ParisaN
                  Jun 6 '18 at 10:49













                  117














                  If you are running in certain remote/scripting situations where you lack interactive access to the prompt-to-add-hostkey, work around it like this:



                  $ ssh -o StrictHostKeyChecking=no user@something.example.com uptime


                  Warning: Permanently added 'something.example.com,10.11.12.13' (RSA) to the list of known hosts.






                  share|improve this answer





















                  • 6





                    +1, this is an ugly solution, but in some cases of automated monitoring processes that work with dymaic ip-connected devices, this is a simple and acceptable solution.

                    – Ninsuo
                    Nov 11 '13 at 14:34






                  • 11





                    +1 For example, for Jenkins executions, this is a good solution. Thanks

                    – Lobo
                    Feb 5 '15 at 10:02






                  • 5





                    @Lobo can't agree more, i am using it for jenkins, which is cool sh """ssh -o StrictHostKeyChecking=No ec2-user@someIpAddress-e2e sudo service tomcat restart"""

                    – prayagupd
                    Jun 8 '17 at 21:40











                  • Saved My Life. Life saver solution.

                    – user1735921
                    Oct 12 '17 at 6:43
















                  117














                  If you are running in certain remote/scripting situations where you lack interactive access to the prompt-to-add-hostkey, work around it like this:



                  $ ssh -o StrictHostKeyChecking=no user@something.example.com uptime


                  Warning: Permanently added 'something.example.com,10.11.12.13' (RSA) to the list of known hosts.






                  share|improve this answer





















                  • 6





                    +1, this is an ugly solution, but in some cases of automated monitoring processes that work with dymaic ip-connected devices, this is a simple and acceptable solution.

                    – Ninsuo
                    Nov 11 '13 at 14:34






                  • 11





                    +1 For example, for Jenkins executions, this is a good solution. Thanks

                    – Lobo
                    Feb 5 '15 at 10:02






                  • 5





                    @Lobo can't agree more, i am using it for jenkins, which is cool sh """ssh -o StrictHostKeyChecking=No ec2-user@someIpAddress-e2e sudo service tomcat restart"""

                    – prayagupd
                    Jun 8 '17 at 21:40











                  • Saved My Life. Life saver solution.

                    – user1735921
                    Oct 12 '17 at 6:43














                  117












                  117








                  117







                  If you are running in certain remote/scripting situations where you lack interactive access to the prompt-to-add-hostkey, work around it like this:



                  $ ssh -o StrictHostKeyChecking=no user@something.example.com uptime


                  Warning: Permanently added 'something.example.com,10.11.12.13' (RSA) to the list of known hosts.






                  share|improve this answer















                  If you are running in certain remote/scripting situations where you lack interactive access to the prompt-to-add-hostkey, work around it like this:



                  $ ssh -o StrictHostKeyChecking=no user@something.example.com uptime


                  Warning: Permanently added 'something.example.com,10.11.12.13' (RSA) to the list of known hosts.







                  share|improve this answer














                  share|improve this answer



                  share|improve this answer








                  edited Nov 11 '13 at 15:14









                  Ninsuo

                  57059




                  57059










                  answered Jul 24 '13 at 0:47









                  MarkHuMarkHu

                  3,02021111




                  3,02021111








                  • 6





                    +1, this is an ugly solution, but in some cases of automated monitoring processes that work with dymaic ip-connected devices, this is a simple and acceptable solution.

                    – Ninsuo
                    Nov 11 '13 at 14:34






                  • 11





                    +1 For example, for Jenkins executions, this is a good solution. Thanks

                    – Lobo
                    Feb 5 '15 at 10:02






                  • 5





                    @Lobo can't agree more, i am using it for jenkins, which is cool sh """ssh -o StrictHostKeyChecking=No ec2-user@someIpAddress-e2e sudo service tomcat restart"""

                    – prayagupd
                    Jun 8 '17 at 21:40











                  • Saved My Life. Life saver solution.

                    – user1735921
                    Oct 12 '17 at 6:43














                  • 6





                    +1, this is an ugly solution, but in some cases of automated monitoring processes that work with dymaic ip-connected devices, this is a simple and acceptable solution.

                    – Ninsuo
                    Nov 11 '13 at 14:34






                  • 11





                    +1 For example, for Jenkins executions, this is a good solution. Thanks

                    – Lobo
                    Feb 5 '15 at 10:02






                  • 5





                    @Lobo can't agree more, i am using it for jenkins, which is cool sh """ssh -o StrictHostKeyChecking=No ec2-user@someIpAddress-e2e sudo service tomcat restart"""

                    – prayagupd
                    Jun 8 '17 at 21:40











                  • Saved My Life. Life saver solution.

                    – user1735921
                    Oct 12 '17 at 6:43








                  6




                  6





                  +1, this is an ugly solution, but in some cases of automated monitoring processes that work with dymaic ip-connected devices, this is a simple and acceptable solution.

                  – Ninsuo
                  Nov 11 '13 at 14:34





                  +1, this is an ugly solution, but in some cases of automated monitoring processes that work with dymaic ip-connected devices, this is a simple and acceptable solution.

                  – Ninsuo
                  Nov 11 '13 at 14:34




                  11




                  11





                  +1 For example, for Jenkins executions, this is a good solution. Thanks

                  – Lobo
                  Feb 5 '15 at 10:02





                  +1 For example, for Jenkins executions, this is a good solution. Thanks

                  – Lobo
                  Feb 5 '15 at 10:02




                  5




                  5





                  @Lobo can't agree more, i am using it for jenkins, which is cool sh """ssh -o StrictHostKeyChecking=No ec2-user@someIpAddress-e2e sudo service tomcat restart"""

                  – prayagupd
                  Jun 8 '17 at 21:40





                  @Lobo can't agree more, i am using it for jenkins, which is cool sh """ssh -o StrictHostKeyChecking=No ec2-user@someIpAddress-e2e sudo service tomcat restart"""

                  – prayagupd
                  Jun 8 '17 at 21:40













                  Saved My Life. Life saver solution.

                  – user1735921
                  Oct 12 '17 at 6:43





                  Saved My Life. Life saver solution.

                  – user1735921
                  Oct 12 '17 at 6:43











                  10














                  Also sometimes there is situation when you are working on serial console, then checking above command in verbose mode -v will show you /dev/tty does not exist, while it does.



                  ssh -v user@hostname


                  In above case just remove /dev/tty and create a symlink of /dev/ttyS0 to /dev/tty.



                  rm /dev/tty
                  ln -s /dev/ttyS0 /dev/tty


                  As an alternative, add id_rsa.pub to the remote location, so password is not prompted and you get login access.






                  share|improve this answer





















                  • 6





                    +1 for advising to use -v parameter; this can help a lot when debugging ssh problems.

                    – daniel kullmann
                    Jul 24 '12 at 19:10
















                  10














                  Also sometimes there is situation when you are working on serial console, then checking above command in verbose mode -v will show you /dev/tty does not exist, while it does.



                  ssh -v user@hostname


                  In above case just remove /dev/tty and create a symlink of /dev/ttyS0 to /dev/tty.



                  rm /dev/tty
                  ln -s /dev/ttyS0 /dev/tty


                  As an alternative, add id_rsa.pub to the remote location, so password is not prompted and you get login access.






                  share|improve this answer





















                  • 6





                    +1 for advising to use -v parameter; this can help a lot when debugging ssh problems.

                    – daniel kullmann
                    Jul 24 '12 at 19:10














                  10












                  10








                  10







                  Also sometimes there is situation when you are working on serial console, then checking above command in verbose mode -v will show you /dev/tty does not exist, while it does.



                  ssh -v user@hostname


                  In above case just remove /dev/tty and create a symlink of /dev/ttyS0 to /dev/tty.



                  rm /dev/tty
                  ln -s /dev/ttyS0 /dev/tty


                  As an alternative, add id_rsa.pub to the remote location, so password is not prompted and you get login access.






                  share|improve this answer















                  Also sometimes there is situation when you are working on serial console, then checking above command in verbose mode -v will show you /dev/tty does not exist, while it does.



                  ssh -v user@hostname


                  In above case just remove /dev/tty and create a symlink of /dev/ttyS0 to /dev/tty.



                  rm /dev/tty
                  ln -s /dev/ttyS0 /dev/tty


                  As an alternative, add id_rsa.pub to the remote location, so password is not prompted and you get login access.







                  share|improve this answer














                  share|improve this answer



                  share|improve this answer








                  edited Jan 10 '14 at 8:53









                  kiri

                  19.4k1360106




                  19.4k1360106










                  answered May 27 '12 at 13:01









                  PeeyushPeeyush

                  217149




                  217149








                  • 6





                    +1 for advising to use -v parameter; this can help a lot when debugging ssh problems.

                    – daniel kullmann
                    Jul 24 '12 at 19:10














                  • 6





                    +1 for advising to use -v parameter; this can help a lot when debugging ssh problems.

                    – daniel kullmann
                    Jul 24 '12 at 19:10








                  6




                  6





                  +1 for advising to use -v parameter; this can help a lot when debugging ssh problems.

                  – daniel kullmann
                  Jul 24 '12 at 19:10





                  +1 for advising to use -v parameter; this can help a lot when debugging ssh problems.

                  – daniel kullmann
                  Jul 24 '12 at 19:10











                  8














                  In my case, this was caused by a udev problem - there was no /dev/tty device node. The solution for me was just:



                  sudo mknod -m 666 /dev/tty c 5 0





                  share|improve this answer






























                    8














                    In my case, this was caused by a udev problem - there was no /dev/tty device node. The solution for me was just:



                    sudo mknod -m 666 /dev/tty c 5 0





                    share|improve this answer




























                      8












                      8








                      8







                      In my case, this was caused by a udev problem - there was no /dev/tty device node. The solution for me was just:



                      sudo mknod -m 666 /dev/tty c 5 0





                      share|improve this answer















                      In my case, this was caused by a udev problem - there was no /dev/tty device node. The solution for me was just:



                      sudo mknod -m 666 /dev/tty c 5 0






                      share|improve this answer














                      share|improve this answer



                      share|improve this answer








                      edited Sep 22 '16 at 20:53









                      muru

                      1




                      1










                      answered Jul 25 '11 at 20:28









                      MarkMark

                      811




                      811























                          6














                          On terminal:



                          ssh -o StrictHostKeyChecking=No -i YourPublicKey.pem user@example.com uptime


                          The following message, or similar, will appear:



                          Warning: Permanently added 'example.com, XX.XXX.XXX.XX' (ECDSA) to the list of known hosts.
                          00:47:37 up 3 min, 0 users, load average: 0.00, 0.00, 0.00


                          Then, connect to your EC2 as normal:



                          ssh -i YourPublickey.pem user@example.com





                          share|improve this answer
























                          • I got command-line line 0: Bad yes/no/ask argument. because you wrongly use 'No' instead of 'no' as argument to StrictHostKeyChecking

                            – Axel Bregnsbo
                            Aug 25 '18 at 15:30
















                          6














                          On terminal:



                          ssh -o StrictHostKeyChecking=No -i YourPublicKey.pem user@example.com uptime


                          The following message, or similar, will appear:



                          Warning: Permanently added 'example.com, XX.XXX.XXX.XX' (ECDSA) to the list of known hosts.
                          00:47:37 up 3 min, 0 users, load average: 0.00, 0.00, 0.00


                          Then, connect to your EC2 as normal:



                          ssh -i YourPublickey.pem user@example.com





                          share|improve this answer
























                          • I got command-line line 0: Bad yes/no/ask argument. because you wrongly use 'No' instead of 'no' as argument to StrictHostKeyChecking

                            – Axel Bregnsbo
                            Aug 25 '18 at 15:30














                          6












                          6








                          6







                          On terminal:



                          ssh -o StrictHostKeyChecking=No -i YourPublicKey.pem user@example.com uptime


                          The following message, or similar, will appear:



                          Warning: Permanently added 'example.com, XX.XXX.XXX.XX' (ECDSA) to the list of known hosts.
                          00:47:37 up 3 min, 0 users, load average: 0.00, 0.00, 0.00


                          Then, connect to your EC2 as normal:



                          ssh -i YourPublickey.pem user@example.com





                          share|improve this answer













                          On terminal:



                          ssh -o StrictHostKeyChecking=No -i YourPublicKey.pem user@example.com uptime


                          The following message, or similar, will appear:



                          Warning: Permanently added 'example.com, XX.XXX.XXX.XX' (ECDSA) to the list of known hosts.
                          00:47:37 up 3 min, 0 users, load average: 0.00, 0.00, 0.00


                          Then, connect to your EC2 as normal:



                          ssh -i YourPublickey.pem user@example.com






                          share|improve this answer












                          share|improve this answer



                          share|improve this answer










                          answered Mar 27 '17 at 0:50









                          Vitor AbellaVitor Abella

                          2,973113164




                          2,973113164













                          • I got command-line line 0: Bad yes/no/ask argument. because you wrongly use 'No' instead of 'no' as argument to StrictHostKeyChecking

                            – Axel Bregnsbo
                            Aug 25 '18 at 15:30



















                          • I got command-line line 0: Bad yes/no/ask argument. because you wrongly use 'No' instead of 'no' as argument to StrictHostKeyChecking

                            – Axel Bregnsbo
                            Aug 25 '18 at 15:30

















                          I got command-line line 0: Bad yes/no/ask argument. because you wrongly use 'No' instead of 'no' as argument to StrictHostKeyChecking

                          – Axel Bregnsbo
                          Aug 25 '18 at 15:30





                          I got command-line line 0: Bad yes/no/ask argument. because you wrongly use 'No' instead of 'no' as argument to StrictHostKeyChecking

                          – Axel Bregnsbo
                          Aug 25 '18 at 15:30











                          3














                          Well, it simply because the second ubuntu requires connection by key and not password.



                          I suggest you use sudo dpkg-reconfigure openssh-server on your pc, and then it should work properly. It will reset the configuration for openssh and should come back to a default password authentication.



                          Second possibility is that there's already a key for your other ubuntu in you PC, and that it changed thus being not recognized anymore. In this case, you'll have to edit the file .ssh/authorized_keys to remove the problematic line identifying your ubuntu.






                          share|improve this answer




























                            3














                            Well, it simply because the second ubuntu requires connection by key and not password.



                            I suggest you use sudo dpkg-reconfigure openssh-server on your pc, and then it should work properly. It will reset the configuration for openssh and should come back to a default password authentication.



                            Second possibility is that there's already a key for your other ubuntu in you PC, and that it changed thus being not recognized anymore. In this case, you'll have to edit the file .ssh/authorized_keys to remove the problematic line identifying your ubuntu.






                            share|improve this answer


























                              3












                              3








                              3







                              Well, it simply because the second ubuntu requires connection by key and not password.



                              I suggest you use sudo dpkg-reconfigure openssh-server on your pc, and then it should work properly. It will reset the configuration for openssh and should come back to a default password authentication.



                              Second possibility is that there's already a key for your other ubuntu in you PC, and that it changed thus being not recognized anymore. In this case, you'll have to edit the file .ssh/authorized_keys to remove the problematic line identifying your ubuntu.






                              share|improve this answer













                              Well, it simply because the second ubuntu requires connection by key and not password.



                              I suggest you use sudo dpkg-reconfigure openssh-server on your pc, and then it should work properly. It will reset the configuration for openssh and should come back to a default password authentication.



                              Second possibility is that there's already a key for your other ubuntu in you PC, and that it changed thus being not recognized anymore. In this case, you'll have to edit the file .ssh/authorized_keys to remove the problematic line identifying your ubuntu.







                              share|improve this answer












                              share|improve this answer



                              share|improve this answer










                              answered May 28 '11 at 11:39









                              MP0MP0

                              1312




                              1312























                                  3














                                  This is an old thread and I just ran across this answer, I will just add what I did to solve this.



                                  ssh-keygen -f "/home/USER/.ssh/known_hosts" -R HOSTNAME


                                  I just looked at the error message that it threw at me and it said to run that command in order to remove it from the list of hosts. After that I did the following:



                                  ssh-copy-id HOSTNAME


                                  Than I followed the prompts from there until I was able to ssh into the server.






                                  share|improve this answer
























                                  • As this command I am getting as suggestion in ubuntu 12.4.

                                    – MaNKuR
                                    May 31 '15 at 18:09
















                                  3














                                  This is an old thread and I just ran across this answer, I will just add what I did to solve this.



                                  ssh-keygen -f "/home/USER/.ssh/known_hosts" -R HOSTNAME


                                  I just looked at the error message that it threw at me and it said to run that command in order to remove it from the list of hosts. After that I did the following:



                                  ssh-copy-id HOSTNAME


                                  Than I followed the prompts from there until I was able to ssh into the server.






                                  share|improve this answer
























                                  • As this command I am getting as suggestion in ubuntu 12.4.

                                    – MaNKuR
                                    May 31 '15 at 18:09














                                  3












                                  3








                                  3







                                  This is an old thread and I just ran across this answer, I will just add what I did to solve this.



                                  ssh-keygen -f "/home/USER/.ssh/known_hosts" -R HOSTNAME


                                  I just looked at the error message that it threw at me and it said to run that command in order to remove it from the list of hosts. After that I did the following:



                                  ssh-copy-id HOSTNAME


                                  Than I followed the prompts from there until I was able to ssh into the server.






                                  share|improve this answer













                                  This is an old thread and I just ran across this answer, I will just add what I did to solve this.



                                  ssh-keygen -f "/home/USER/.ssh/known_hosts" -R HOSTNAME


                                  I just looked at the error message that it threw at me and it said to run that command in order to remove it from the list of hosts. After that I did the following:



                                  ssh-copy-id HOSTNAME


                                  Than I followed the prompts from there until I was able to ssh into the server.







                                  share|improve this answer












                                  share|improve this answer



                                  share|improve this answer










                                  answered Apr 15 '15 at 16:09









                                  Hatem JaberHatem Jaber

                                  271310




                                  271310













                                  • As this command I am getting as suggestion in ubuntu 12.4.

                                    – MaNKuR
                                    May 31 '15 at 18:09



















                                  • As this command I am getting as suggestion in ubuntu 12.4.

                                    – MaNKuR
                                    May 31 '15 at 18:09

















                                  As this command I am getting as suggestion in ubuntu 12.4.

                                  – MaNKuR
                                  May 31 '15 at 18:09





                                  As this command I am getting as suggestion in ubuntu 12.4.

                                  – MaNKuR
                                  May 31 '15 at 18:09











                                  2














                                  Its means your remote host key was changed (May be host password change),



                                  Your terminal suggested to execute this command as root user



                                  $ ssh-keygen -f "/root/.ssh/known_hosts" -R [www.website.net]:4231


                                  You have to remove that host name from hosts list on your pc/server. Copy that suggested command and execute as a root user.



                                  $ sudo su                                                            // Login as a root user

                                  $ ssh-keygen -f "/root/.ssh/known_hosts" -R [www.website.net]:4231 // Terminal suggested command execute here
                                  Host [www.website.net]:4231 found: line 16 type ECDSA
                                  /root/.ssh/known_hosts updated.
                                  Original contents retained as /root/.ssh/known_hosts.old

                                  $ exit // Exist from root user

                                  $ sudo ssh root@www.website.net -p 4231 // Try again


                                  Hope this works.






                                  share|improve this answer




























                                    2














                                    Its means your remote host key was changed (May be host password change),



                                    Your terminal suggested to execute this command as root user



                                    $ ssh-keygen -f "/root/.ssh/known_hosts" -R [www.website.net]:4231


                                    You have to remove that host name from hosts list on your pc/server. Copy that suggested command and execute as a root user.



                                    $ sudo su                                                            // Login as a root user

                                    $ ssh-keygen -f "/root/.ssh/known_hosts" -R [www.website.net]:4231 // Terminal suggested command execute here
                                    Host [www.website.net]:4231 found: line 16 type ECDSA
                                    /root/.ssh/known_hosts updated.
                                    Original contents retained as /root/.ssh/known_hosts.old

                                    $ exit // Exist from root user

                                    $ sudo ssh root@www.website.net -p 4231 // Try again


                                    Hope this works.






                                    share|improve this answer


























                                      2












                                      2








                                      2







                                      Its means your remote host key was changed (May be host password change),



                                      Your terminal suggested to execute this command as root user



                                      $ ssh-keygen -f "/root/.ssh/known_hosts" -R [www.website.net]:4231


                                      You have to remove that host name from hosts list on your pc/server. Copy that suggested command and execute as a root user.



                                      $ sudo su                                                            // Login as a root user

                                      $ ssh-keygen -f "/root/.ssh/known_hosts" -R [www.website.net]:4231 // Terminal suggested command execute here
                                      Host [www.website.net]:4231 found: line 16 type ECDSA
                                      /root/.ssh/known_hosts updated.
                                      Original contents retained as /root/.ssh/known_hosts.old

                                      $ exit // Exist from root user

                                      $ sudo ssh root@www.website.net -p 4231 // Try again


                                      Hope this works.






                                      share|improve this answer













                                      Its means your remote host key was changed (May be host password change),



                                      Your terminal suggested to execute this command as root user



                                      $ ssh-keygen -f "/root/.ssh/known_hosts" -R [www.website.net]:4231


                                      You have to remove that host name from hosts list on your pc/server. Copy that suggested command and execute as a root user.



                                      $ sudo su                                                            // Login as a root user

                                      $ ssh-keygen -f "/root/.ssh/known_hosts" -R [www.website.net]:4231 // Terminal suggested command execute here
                                      Host [www.website.net]:4231 found: line 16 type ECDSA
                                      /root/.ssh/known_hosts updated.
                                      Original contents retained as /root/.ssh/known_hosts.old

                                      $ exit // Exist from root user

                                      $ sudo ssh root@www.website.net -p 4231 // Try again


                                      Hope this works.







                                      share|improve this answer












                                      share|improve this answer



                                      share|improve this answer










                                      answered Aug 14 '16 at 4:59









                                      Jay PatelJay Patel

                                      1787




                                      1787























                                          1














                                          You should change your key in this way:
                                          From your given error find which host-key changed for
                                          example: Offending ECDSA key in /Users/user-name/.ssh/known_hosts:5
                                          said 5th key changed, so do this:



                                          sed -i '5d' ~/.ssh/known_hosts


                                          Notice: you must be root or have privilege for sudo.






                                          share|improve this answer
























                                          • No, unless you are doing it for someone else, it does not require root nor sudo. You are editing the file in your home directory. Second: for the command to work it requires GNU sed.

                                            – techraf
                                            Mar 13 '16 at 16:00











                                          • Maybe you right but I tried to ssh from Mac OSX to ubuntu-server and I have to do that. by the way thank you for your comment.

                                            – Amir.A.G
                                            Mar 14 '16 at 16:44


















                                          1














                                          You should change your key in this way:
                                          From your given error find which host-key changed for
                                          example: Offending ECDSA key in /Users/user-name/.ssh/known_hosts:5
                                          said 5th key changed, so do this:



                                          sed -i '5d' ~/.ssh/known_hosts


                                          Notice: you must be root or have privilege for sudo.






                                          share|improve this answer
























                                          • No, unless you are doing it for someone else, it does not require root nor sudo. You are editing the file in your home directory. Second: for the command to work it requires GNU sed.

                                            – techraf
                                            Mar 13 '16 at 16:00











                                          • Maybe you right but I tried to ssh from Mac OSX to ubuntu-server and I have to do that. by the way thank you for your comment.

                                            – Amir.A.G
                                            Mar 14 '16 at 16:44
















                                          1












                                          1








                                          1







                                          You should change your key in this way:
                                          From your given error find which host-key changed for
                                          example: Offending ECDSA key in /Users/user-name/.ssh/known_hosts:5
                                          said 5th key changed, so do this:



                                          sed -i '5d' ~/.ssh/known_hosts


                                          Notice: you must be root or have privilege for sudo.






                                          share|improve this answer













                                          You should change your key in this way:
                                          From your given error find which host-key changed for
                                          example: Offending ECDSA key in /Users/user-name/.ssh/known_hosts:5
                                          said 5th key changed, so do this:



                                          sed -i '5d' ~/.ssh/known_hosts


                                          Notice: you must be root or have privilege for sudo.







                                          share|improve this answer












                                          share|improve this answer



                                          share|improve this answer










                                          answered Mar 13 '16 at 15:22









                                          Amir.A.GAmir.A.G

                                          113




                                          113













                                          • No, unless you are doing it for someone else, it does not require root nor sudo. You are editing the file in your home directory. Second: for the command to work it requires GNU sed.

                                            – techraf
                                            Mar 13 '16 at 16:00











                                          • Maybe you right but I tried to ssh from Mac OSX to ubuntu-server and I have to do that. by the way thank you for your comment.

                                            – Amir.A.G
                                            Mar 14 '16 at 16:44





















                                          • No, unless you are doing it for someone else, it does not require root nor sudo. You are editing the file in your home directory. Second: for the command to work it requires GNU sed.

                                            – techraf
                                            Mar 13 '16 at 16:00











                                          • Maybe you right but I tried to ssh from Mac OSX to ubuntu-server and I have to do that. by the way thank you for your comment.

                                            – Amir.A.G
                                            Mar 14 '16 at 16:44



















                                          No, unless you are doing it for someone else, it does not require root nor sudo. You are editing the file in your home directory. Second: for the command to work it requires GNU sed.

                                          – techraf
                                          Mar 13 '16 at 16:00





                                          No, unless you are doing it for someone else, it does not require root nor sudo. You are editing the file in your home directory. Second: for the command to work it requires GNU sed.

                                          – techraf
                                          Mar 13 '16 at 16:00













                                          Maybe you right but I tried to ssh from Mac OSX to ubuntu-server and I have to do that. by the way thank you for your comment.

                                          – Amir.A.G
                                          Mar 14 '16 at 16:44







                                          Maybe you right but I tried to ssh from Mac OSX to ubuntu-server and I have to do that. by the way thank you for your comment.

                                          – Amir.A.G
                                          Mar 14 '16 at 16:44













                                          1














                                          you have to put the rsa key of the target host into the source host /home/user/.ssh/known_hosts by running this on the target



                                          ssh-keyscan -t rsa @targethost





                                          share|improve this answer






























                                            1














                                            you have to put the rsa key of the target host into the source host /home/user/.ssh/known_hosts by running this on the target



                                            ssh-keyscan -t rsa @targethost





                                            share|improve this answer




























                                              1












                                              1








                                              1







                                              you have to put the rsa key of the target host into the source host /home/user/.ssh/known_hosts by running this on the target



                                              ssh-keyscan -t rsa @targethost





                                              share|improve this answer















                                              you have to put the rsa key of the target host into the source host /home/user/.ssh/known_hosts by running this on the target



                                              ssh-keyscan -t rsa @targethost






                                              share|improve this answer














                                              share|improve this answer



                                              share|improve this answer








                                              edited Apr 6 '17 at 16:56

























                                              answered Apr 6 '17 at 15:42









                                              rob brennanrob brennan

                                              112




                                              112























                                                  1














                                                  May you just need to enter "yes" when ssh confirm you want to continue connectting.



                                                  Like bellow.



                                                  The authenticity of host 'xxx' can't be established.
                                                  ECDSA key fingerprint is yyy.
                                                  Are you sure you want to continue connecting (yes/no)? yes
                                                  Warning: Permanently added 'xxx' (ECDSA) to the list of known hosts.
                                                  Enter passphrase for key '/Users/ysy/.ssh/id_rsa':


                                                  Then enter your password.



                                                  Please pay attention to "Are you sure you want to continue connecting (yes/no)? yes". You must enter yes, not enter.






                                                  share|improve this answer




























                                                    1














                                                    May you just need to enter "yes" when ssh confirm you want to continue connectting.



                                                    Like bellow.



                                                    The authenticity of host 'xxx' can't be established.
                                                    ECDSA key fingerprint is yyy.
                                                    Are you sure you want to continue connecting (yes/no)? yes
                                                    Warning: Permanently added 'xxx' (ECDSA) to the list of known hosts.
                                                    Enter passphrase for key '/Users/ysy/.ssh/id_rsa':


                                                    Then enter your password.



                                                    Please pay attention to "Are you sure you want to continue connecting (yes/no)? yes". You must enter yes, not enter.






                                                    share|improve this answer


























                                                      1












                                                      1








                                                      1







                                                      May you just need to enter "yes" when ssh confirm you want to continue connectting.



                                                      Like bellow.



                                                      The authenticity of host 'xxx' can't be established.
                                                      ECDSA key fingerprint is yyy.
                                                      Are you sure you want to continue connecting (yes/no)? yes
                                                      Warning: Permanently added 'xxx' (ECDSA) to the list of known hosts.
                                                      Enter passphrase for key '/Users/ysy/.ssh/id_rsa':


                                                      Then enter your password.



                                                      Please pay attention to "Are you sure you want to continue connecting (yes/no)? yes". You must enter yes, not enter.






                                                      share|improve this answer













                                                      May you just need to enter "yes" when ssh confirm you want to continue connectting.



                                                      Like bellow.



                                                      The authenticity of host 'xxx' can't be established.
                                                      ECDSA key fingerprint is yyy.
                                                      Are you sure you want to continue connecting (yes/no)? yes
                                                      Warning: Permanently added 'xxx' (ECDSA) to the list of known hosts.
                                                      Enter passphrase for key '/Users/ysy/.ssh/id_rsa':


                                                      Then enter your password.



                                                      Please pay attention to "Are you sure you want to continue connecting (yes/no)? yes". You must enter yes, not enter.







                                                      share|improve this answer












                                                      share|improve this answer



                                                      share|improve this answer










                                                      answered Feb 14 at 6:49









                                                      JChen___JChen___

                                                      1111




                                                      1111























                                                          0














                                                          pico ~/.ssh/known_hosts and delete all lines, after just reconnect and you will get a new key.






                                                          share|improve this answer





















                                                          • 5





                                                            This is a dangerous solution, because you will remove ALL your host keys. The accepted solution, ssh-keygen -R hostname is better.

                                                            – msanford
                                                            Mar 24 '14 at 20:52
















                                                          0














                                                          pico ~/.ssh/known_hosts and delete all lines, after just reconnect and you will get a new key.






                                                          share|improve this answer





















                                                          • 5





                                                            This is a dangerous solution, because you will remove ALL your host keys. The accepted solution, ssh-keygen -R hostname is better.

                                                            – msanford
                                                            Mar 24 '14 at 20:52














                                                          0












                                                          0








                                                          0







                                                          pico ~/.ssh/known_hosts and delete all lines, after just reconnect and you will get a new key.






                                                          share|improve this answer















                                                          pico ~/.ssh/known_hosts and delete all lines, after just reconnect and you will get a new key.







                                                          share|improve this answer














                                                          share|improve this answer



                                                          share|improve this answer








                                                          edited Oct 18 '12 at 7:40









                                                          Mark Paskal

                                                          2,66411827




                                                          2,66411827










                                                          answered Oct 18 '12 at 6:26









                                                          H0nsuH0nsu

                                                          91




                                                          91








                                                          • 5





                                                            This is a dangerous solution, because you will remove ALL your host keys. The accepted solution, ssh-keygen -R hostname is better.

                                                            – msanford
                                                            Mar 24 '14 at 20:52














                                                          • 5





                                                            This is a dangerous solution, because you will remove ALL your host keys. The accepted solution, ssh-keygen -R hostname is better.

                                                            – msanford
                                                            Mar 24 '14 at 20:52








                                                          5




                                                          5





                                                          This is a dangerous solution, because you will remove ALL your host keys. The accepted solution, ssh-keygen -R hostname is better.

                                                          – msanford
                                                          Mar 24 '14 at 20:52





                                                          This is a dangerous solution, because you will remove ALL your host keys. The accepted solution, ssh-keygen -R hostname is better.

                                                          – msanford
                                                          Mar 24 '14 at 20:52











                                                          0














                                                          My solution comes from this blog post: Algorithm negotiation failed for SSH Secure Shell Client



                                                          You need to modify the file as follows:



                                                          sudo nano /etc/ssh/sshd_config


                                                          And then add the following:



                                                          # Ciphers
                                                          Ciphers aes128-cbc,aes192-cbc,aes256-cbc,blowfish-cbc,arcfour
                                                          KexAlgorithms diffie-hellman-group1-sha1


                                                          Basically you tried different solutions until you find one which can solve your problem. If the above solutions don't work, please try this one. If this one doesn't work as well, please try others.






                                                          share|improve this answer






























                                                            0














                                                            My solution comes from this blog post: Algorithm negotiation failed for SSH Secure Shell Client



                                                            You need to modify the file as follows:



                                                            sudo nano /etc/ssh/sshd_config


                                                            And then add the following:



                                                            # Ciphers
                                                            Ciphers aes128-cbc,aes192-cbc,aes256-cbc,blowfish-cbc,arcfour
                                                            KexAlgorithms diffie-hellman-group1-sha1


                                                            Basically you tried different solutions until you find one which can solve your problem. If the above solutions don't work, please try this one. If this one doesn't work as well, please try others.






                                                            share|improve this answer




























                                                              0












                                                              0








                                                              0







                                                              My solution comes from this blog post: Algorithm negotiation failed for SSH Secure Shell Client



                                                              You need to modify the file as follows:



                                                              sudo nano /etc/ssh/sshd_config


                                                              And then add the following:



                                                              # Ciphers
                                                              Ciphers aes128-cbc,aes192-cbc,aes256-cbc,blowfish-cbc,arcfour
                                                              KexAlgorithms diffie-hellman-group1-sha1


                                                              Basically you tried different solutions until you find one which can solve your problem. If the above solutions don't work, please try this one. If this one doesn't work as well, please try others.






                                                              share|improve this answer















                                                              My solution comes from this blog post: Algorithm negotiation failed for SSH Secure Shell Client



                                                              You need to modify the file as follows:



                                                              sudo nano /etc/ssh/sshd_config


                                                              And then add the following:



                                                              # Ciphers
                                                              Ciphers aes128-cbc,aes192-cbc,aes256-cbc,blowfish-cbc,arcfour
                                                              KexAlgorithms diffie-hellman-group1-sha1


                                                              Basically you tried different solutions until you find one which can solve your problem. If the above solutions don't work, please try this one. If this one doesn't work as well, please try others.







                                                              share|improve this answer














                                                              share|improve this answer



                                                              share|improve this answer








                                                              edited Apr 6 '17 at 20:24









                                                              wjandrea

                                                              9,57042765




                                                              9,57042765










                                                              answered Apr 6 '17 at 17:01









                                                              Frank PukFrank Puk

                                                              1




                                                              1























                                                                  0














                                                                  Just disable strict host key checking in your ~/.ssh/config:



                                                                  Host *
                                                                  StrictHostKeyChecking no





                                                                  share|improve this answer




























                                                                    0














                                                                    Just disable strict host key checking in your ~/.ssh/config:



                                                                    Host *
                                                                    StrictHostKeyChecking no





                                                                    share|improve this answer


























                                                                      0












                                                                      0








                                                                      0







                                                                      Just disable strict host key checking in your ~/.ssh/config:



                                                                      Host *
                                                                      StrictHostKeyChecking no





                                                                      share|improve this answer













                                                                      Just disable strict host key checking in your ~/.ssh/config:



                                                                      Host *
                                                                      StrictHostKeyChecking no






                                                                      share|improve this answer












                                                                      share|improve this answer



                                                                      share|improve this answer










                                                                      answered Apr 26 '18 at 15:27









                                                                      TimoTimo

                                                                      1707




                                                                      1707























                                                                          -1














                                                                          chmod 666 /dev/tty 


                                                                          is yet another tty solution - sometimes, this device file has wrong permissions.






                                                                          share|improve this answer










                                                                          New contributor




                                                                          Alex is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
                                                                          Check out our Code of Conduct.

























                                                                            -1














                                                                            chmod 666 /dev/tty 


                                                                            is yet another tty solution - sometimes, this device file has wrong permissions.






                                                                            share|improve this answer










                                                                            New contributor




                                                                            Alex is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
                                                                            Check out our Code of Conduct.























                                                                              -1












                                                                              -1








                                                                              -1







                                                                              chmod 666 /dev/tty 


                                                                              is yet another tty solution - sometimes, this device file has wrong permissions.






                                                                              share|improve this answer










                                                                              New contributor




                                                                              Alex is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
                                                                              Check out our Code of Conduct.










                                                                              chmod 666 /dev/tty 


                                                                              is yet another tty solution - sometimes, this device file has wrong permissions.







                                                                              share|improve this answer










                                                                              New contributor




                                                                              Alex is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
                                                                              Check out our Code of Conduct.









                                                                              share|improve this answer



                                                                              share|improve this answer








                                                                              edited Apr 7 at 10:02









                                                                              Stephen Ostermiller

                                                                              2,60512644




                                                                              2,60512644






                                                                              New contributor




                                                                              Alex is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
                                                                              Check out our Code of Conduct.









                                                                              answered Apr 6 at 15:58









                                                                              AlexAlex

                                                                              1




                                                                              1




                                                                              New contributor




                                                                              Alex is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
                                                                              Check out our Code of Conduct.





                                                                              New contributor





                                                                              Alex is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
                                                                              Check out our Code of Conduct.






                                                                              Alex is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
                                                                              Check out our Code of Conduct.






























                                                                                  draft saved

                                                                                  draft discarded




















































                                                                                  Thanks for contributing an answer to Ask Ubuntu!


                                                                                  • Please be sure to answer the question. Provide details and share your research!

                                                                                  But avoid



                                                                                  • Asking for help, clarification, or responding to other answers.

                                                                                  • Making statements based on opinion; back them up with references or personal experience.


                                                                                  To learn more, see our tips on writing great answers.




                                                                                  draft saved


                                                                                  draft discarded














                                                                                  StackExchange.ready(
                                                                                  function () {
                                                                                  StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2faskubuntu.com%2fquestions%2f45679%2fssh-connection-problem-with-host-key-verification-failed-error%23new-answer', 'question_page');
                                                                                  }
                                                                                  );

                                                                                  Post as a guest















                                                                                  Required, but never shown





















































                                                                                  Required, but never shown














                                                                                  Required, but never shown












                                                                                  Required, but never shown







                                                                                  Required, but never shown

































                                                                                  Required, but never shown














                                                                                  Required, but never shown












                                                                                  Required, but never shown







                                                                                  Required, but never shown







                                                                                  Popular posts from this blog

                                                                                  How to change which sound is reproduced for terminal bell?

                                                                                  Can I use Tabulator js library in my java Spring + Thymeleaf project?

                                                                                  Title Spacing in Bjornstrup Chapter, Removing Chapter Number From Contents