Storing Remote Server Host Keys
When opening the transparent tunnel, accepting new or changed server host
keys cannot be prompted from the user. In addition, transparent FTP
tunneling uses always the IP address of the Secure Shell server when opening
the secure tunnel. This means that the host keys of the Secure Shell
tunneling servers must be stored beforehand based on the IP addresses of the
servers.
The keys can be stored by connecting to each host individually with the IP
address of the host using an interactive shell and accepting the host keys
one by one, or by using the ssh-keydist2
key distribution tool.
More information and examples on storing remote server keys can be found in
Sections Authenticating Remote Server Hosts and Fetching Remote Server Keys.