{"id":7160,"date":"2023-04-24T08:14:57","date_gmt":"2023-04-24T02:44:57","guid":{"rendered":"https:\/\/pheonixsolutions.com\/blog\/?p=7160"},"modified":"2023-04-24T08:15:03","modified_gmt":"2023-04-24T02:45:03","slug":"how-to-disable-strict-host-key-checking-in-ssh","status":"publish","type":"post","link":"https:\/\/pheonixsolutions.com\/blog\/how-to-disable-strict-host-key-checking-in-ssh\/","title":{"rendered":"How to disable strict host key checking in SSH?"},"content":{"rendered":"\n<p><strong>Introduction:<\/strong><\/p>\n\n\n\n<p>SSH (Secure Shell) is a popular network protocol used for secure remote access to servers and other network devices. When connecting to an SSH server for the first time, the client will check the host key of the server to verify its identity. This process is known as strict host key checking. However, there may be situations where you want to disable strict host key checking, such as when connecting to a new server or when the server&#8217;s host key has changed. In this article, we will discuss how to disable strict host key checking in SSH.<\/p>\n\n\n\n<p><strong>Prerequisites:<\/strong><\/p>\n\n\n\n<p>Server credentials.<\/p>\n\n\n\n<p><strong>Procedure<\/strong>:<\/p>\n\n\n\n<p><strong>Step1:<\/strong><\/p>\n\n\n\n<p>Open your SSH configuration file, which is typically located at <code>~\/.ssh\/config<\/code>. If the file does not exist, you can create it.<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>$ vi  <code>~\/.ssh\/config<\/code><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><strong>Step2:<\/strong><\/p>\n\n\n\n<p>Add the following lines to the file:<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Host * <br>StrictHostKeyChecking no<\/td><\/tr><\/tbody><\/table><figcaption class=\"wp-element-caption\">This will apply the setting to all hosts you connect to. If you only want to apply it to specific hosts, replace the <code>*<\/code> with the hostname(s) you want to apply it.<\/figcaption><\/figure>\n\n\n\n<p><strong>Step3:<\/strong><\/p>\n\n\n\n<p>Save the file and exit.<\/p>\n\n\n\n<p><strong>Conclusion:<\/strong><\/p>\n\n\n\n<p>Disabling strict host key checking in SSH can be useful in certain situations, such as when connecting to a new server or when the server&#8217;s host key has changed. However, it also introduces security risks as it allows connections to untrusted hosts without proper authentication<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Introduction: SSH (Secure Shell) is a popular network protocol used for secure remote access to servers and other network devices. When connecting to an SSH server for the first time, the client will check the host key of the server to verify its identity. This process is known as strict&hellip; <a href=\"https:\/\/pheonixsolutions.com\/blog\/how-to-disable-strict-host-key-checking-in-ssh\/\" class=\"more-link read-more\" rel=\"bookmark\">Continue Reading <span class=\"screen-reader-text\">How to disable strict host key checking in SSH?<\/span><i class=\"fa fa-arrow-right\"><\/i><\/a><\/p>\n","protected":false},"author":496,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1],"tags":[],"class_list":{"0":"post-7160","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"hentry","6":"category-uncategorized","7":"h-entry","9":"h-as-article"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Pheonix Solutions - We Empower Your Business Growth<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/pheonixsolutions.com\/blog\/how-to-disable-strict-host-key-checking-in-ssh\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Pheonix Solutions - We Empower Your Business Growth\" \/>\n<meta property=\"og:description\" content=\"Introduction: SSH (Secure Shell) is a popular network protocol used for secure remote access to servers and other network devices. When connecting to an SSH server for the first time, the client will check the host key of the server to verify its identity. This process is known as strict&hellip; Continue Reading How to disable strict host key checking in SSH?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/pheonixsolutions.com\/blog\/how-to-disable-strict-host-key-checking-in-ssh\/\" \/>\n<meta property=\"og:site_name\" content=\"PHEONIXSOLUTIONS\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/PheonixSolutions-209942982759387\/\" \/>\n<meta property=\"article:published_time\" content=\"2023-04-24T02:44:57+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-04-24T02:45:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/pheonixsolutions.com\/blog\/wp-content\/uploads\/2016\/09\/PX2.png\" \/>\n\t<meta property=\"og:image:width\" content=\"3837\" \/>\n\t<meta property=\"og:image:height\" content=\"2540\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Saikrishna Areddy\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pheonixsolution\" \/>\n<meta name=\"twitter:site\" content=\"@pheonixsolution\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Saikrishna Areddy\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/how-to-disable-strict-host-key-checking-in-ssh\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/how-to-disable-strict-host-key-checking-in-ssh\\\/\"},\"author\":{\"name\":\"Saikrishna Areddy\",\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/#\\\/schema\\\/person\\\/fc35ace8f00b25766f1de0edb110bbe1\"},\"headline\":\"How to disable strict host key checking in SSH?\",\"datePublished\":\"2023-04-24T02:44:57+00:00\",\"dateModified\":\"2023-04-24T02:45:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/how-to-disable-strict-host-key-checking-in-ssh\\\/\"},\"wordCount\":228,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/#organization\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/how-to-disable-strict-host-key-checking-in-ssh\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/how-to-disable-strict-host-key-checking-in-ssh\\\/\",\"url\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/how-to-disable-strict-host-key-checking-in-ssh\\\/\",\"name\":\"Pheonix Solutions - We Empower Your Business Growth\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/#website\"},\"datePublished\":\"2023-04-24T02:44:57+00:00\",\"dateModified\":\"2023-04-24T02:45:03+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/how-to-disable-strict-host-key-checking-in-ssh\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/how-to-disable-strict-host-key-checking-in-ssh\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/how-to-disable-strict-host-key-checking-in-ssh\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to disable strict host key checking in SSH?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/\",\"name\":\"Pheonix Solutions\",\"description\":\"We Empower Your Business Growth\",\"publisher\":{\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/#organization\",\"name\":\"PheonixSolutions\",\"url\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/wp-content\\\/uploads\\\/2016\\\/12\\\/logo.png\",\"contentUrl\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/wp-content\\\/uploads\\\/2016\\\/12\\\/logo.png\",\"width\":454,\"height\":300,\"caption\":\"PheonixSolutions\"},\"image\":{\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/PheonixSolutions-209942982759387\\\/\",\"https:\\\/\\\/x.com\\\/pheonixsolution\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/#\\\/schema\\\/person\\\/fc35ace8f00b25766f1de0edb110bbe1\",\"name\":\"Saikrishna Areddy\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/219fb50fa61a168b58a5e704d05058f958504aa8324675172185e3f0e8b3fd24?s=96&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/219fb50fa61a168b58a5e704d05058f958504aa8324675172185e3f0e8b3fd24?s=96&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/219fb50fa61a168b58a5e704d05058f958504aa8324675172185e3f0e8b3fd24?s=96&r=g\",\"caption\":\"Saikrishna Areddy\"},\"url\":\"https:\\\/\\\/pheonixsolutions.com\\\/blog\\\/author\\\/saikrishna\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Pheonix Solutions - We Empower Your Business Growth","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/pheonixsolutions.com\/blog\/how-to-disable-strict-host-key-checking-in-ssh\/","og_locale":"en_US","og_type":"article","og_title":"Pheonix Solutions - We Empower Your Business Growth","og_description":"Introduction: SSH (Secure Shell) is a popular network protocol used for secure remote access to servers and other network devices. When connecting to an SSH server for the first time, the client will check the host key of the server to verify its identity. This process is known as strict&hellip; Continue Reading How to disable strict host key checking in SSH?","og_url":"https:\/\/pheonixsolutions.com\/blog\/how-to-disable-strict-host-key-checking-in-ssh\/","og_site_name":"PHEONIXSOLUTIONS","article_publisher":"https:\/\/www.facebook.com\/PheonixSolutions-209942982759387\/","article_published_time":"2023-04-24T02:44:57+00:00","article_modified_time":"2023-04-24T02:45:03+00:00","og_image":[{"width":3837,"height":2540,"url":"https:\/\/pheonixsolutions.com\/blog\/wp-content\/uploads\/2016\/09\/PX2.png","type":"image\/png"}],"author":"Saikrishna Areddy","twitter_card":"summary_large_image","twitter_creator":"@pheonixsolution","twitter_site":"@pheonixsolution","twitter_misc":{"Written by":"Saikrishna Areddy","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/pheonixsolutions.com\/blog\/how-to-disable-strict-host-key-checking-in-ssh\/#article","isPartOf":{"@id":"https:\/\/pheonixsolutions.com\/blog\/how-to-disable-strict-host-key-checking-in-ssh\/"},"author":{"name":"Saikrishna Areddy","@id":"https:\/\/pheonixsolutions.com\/blog\/#\/schema\/person\/fc35ace8f00b25766f1de0edb110bbe1"},"headline":"How to disable strict host key checking in SSH?","datePublished":"2023-04-24T02:44:57+00:00","dateModified":"2023-04-24T02:45:03+00:00","mainEntityOfPage":{"@id":"https:\/\/pheonixsolutions.com\/blog\/how-to-disable-strict-host-key-checking-in-ssh\/"},"wordCount":228,"commentCount":0,"publisher":{"@id":"https:\/\/pheonixsolutions.com\/blog\/#organization"},"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/pheonixsolutions.com\/blog\/how-to-disable-strict-host-key-checking-in-ssh\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/pheonixsolutions.com\/blog\/how-to-disable-strict-host-key-checking-in-ssh\/","url":"https:\/\/pheonixsolutions.com\/blog\/how-to-disable-strict-host-key-checking-in-ssh\/","name":"Pheonix Solutions - We Empower Your Business Growth","isPartOf":{"@id":"https:\/\/pheonixsolutions.com\/blog\/#website"},"datePublished":"2023-04-24T02:44:57+00:00","dateModified":"2023-04-24T02:45:03+00:00","breadcrumb":{"@id":"https:\/\/pheonixsolutions.com\/blog\/how-to-disable-strict-host-key-checking-in-ssh\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/pheonixsolutions.com\/blog\/how-to-disable-strict-host-key-checking-in-ssh\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/pheonixsolutions.com\/blog\/how-to-disable-strict-host-key-checking-in-ssh\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/pheonixsolutions.com\/blog\/"},{"@type":"ListItem","position":2,"name":"How to disable strict host key checking in SSH?"}]},{"@type":"WebSite","@id":"https:\/\/pheonixsolutions.com\/blog\/#website","url":"https:\/\/pheonixsolutions.com\/blog\/","name":"Pheonix Solutions","description":"We Empower Your Business Growth","publisher":{"@id":"https:\/\/pheonixsolutions.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/pheonixsolutions.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/pheonixsolutions.com\/blog\/#organization","name":"PheonixSolutions","url":"https:\/\/pheonixsolutions.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/pheonixsolutions.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/pheonixsolutions.com\/blog\/wp-content\/uploads\/2016\/12\/logo.png","contentUrl":"https:\/\/pheonixsolutions.com\/blog\/wp-content\/uploads\/2016\/12\/logo.png","width":454,"height":300,"caption":"PheonixSolutions"},"image":{"@id":"https:\/\/pheonixsolutions.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/PheonixSolutions-209942982759387\/","https:\/\/x.com\/pheonixsolution"]},{"@type":"Person","@id":"https:\/\/pheonixsolutions.com\/blog\/#\/schema\/person\/fc35ace8f00b25766f1de0edb110bbe1","name":"Saikrishna Areddy","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/219fb50fa61a168b58a5e704d05058f958504aa8324675172185e3f0e8b3fd24?s=96&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/219fb50fa61a168b58a5e704d05058f958504aa8324675172185e3f0e8b3fd24?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/219fb50fa61a168b58a5e704d05058f958504aa8324675172185e3f0e8b3fd24?s=96&r=g","caption":"Saikrishna Areddy"},"url":"https:\/\/pheonixsolutions.com\/blog\/author\/saikrishna\/"}]}},"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/p7F4uM-1Ru","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/pheonixsolutions.com\/blog\/wp-json\/wp\/v2\/posts\/7160","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pheonixsolutions.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/pheonixsolutions.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/pheonixsolutions.com\/blog\/wp-json\/wp\/v2\/users\/496"}],"replies":[{"embeddable":true,"href":"https:\/\/pheonixsolutions.com\/blog\/wp-json\/wp\/v2\/comments?post=7160"}],"version-history":[{"count":0,"href":"https:\/\/pheonixsolutions.com\/blog\/wp-json\/wp\/v2\/posts\/7160\/revisions"}],"wp:attachment":[{"href":"https:\/\/pheonixsolutions.com\/blog\/wp-json\/wp\/v2\/media?parent=7160"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/pheonixsolutions.com\/blog\/wp-json\/wp\/v2\/categories?post=7160"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/pheonixsolutions.com\/blog\/wp-json\/wp\/v2\/tags?post=7160"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}