Use thesection to manage the keys that authenticate the host to your client session. You can use this tab to view the list of trusted hosts, add or delete host keys, and specify how you want Reflection to handle unknown hosts.
Host authentication enables the Secure Shell client to reliably confirm the identity of the Secure Shell server. This authentication is done using public key authentication. If the host public key has not previously been installed on the client, the first time you attempt to connect you see a message indicating that this is an unknown host. This message includes a fingerprint that identifies the host. To be sure that this is actually your host, you should contact the host system administrator who can confirm that this is the correct fingerprint. Until you know that the host is actually your host, you are at risk of a "man-in-the-middle" attack, in which another server poses as your host. If you selectin response to this prompt, the host is added to the list. To avoid the need to contact the host administrator, you can add host keys to the list before the first connection.
The options are:
Specifies how Reflection should handle host key checking when connecting to an unknown host. The options are:
Display the Host Key Authenticity confirmation dialog box when you connect to an unknown host.
The connection is refused if the host is not a trusted host. Before you can connect, you must add the host key to your list of trusted host keys.
No host key checking is done. The connection is made without displaying a confirmation dialog box. The host key is not added to the list of trusted keys.
Specifies the order of preference for host key algorithms. When this setting is unselected (the default), Reflection requests host certificates before host keys. When this setting is selected, Reflection requests host keys before host certificates.
This setting is useful when the server is configured for both certificate and standard host key authentication. SSH protocol allows only one attempt to authenticate the host. If the host presents a certificate, and the client is not configured for host authentication using certificates, the connection fails. (This is different from user authentication, in which multiple authentication attempts are supported.)
Displays a list of trusted hosts for the current Windows user. You can modify the contents of this list using Import and Delete.
By default, when you attempt a connection to a host that is not on this list, you are asked if you want to trust the new host key. If you select Always in response to this prompt, the host is added to the Trusted Host Keys list.
Use thebutton to import host keys. To delete from the Trusted Host Keys list hover over the desired host key and select the button.
Displays a list of trusted host keys that are available to all users of the computer. Items on this list can be viewed but not edited.
System administrators can modify the The Known Hosts File.list using the global .