Skip to main content
The 2024 Developer Survey results are live! See the results

You are not logged in. Your edit will be placed in a queue until it is peer reviewed.

We welcome edits that make the post easier to understand and more valuable for readers. Because community members review edits, please try to make the post substantially better than how you found it, for example, by fixing grammar or adding additional resources and hyperlinks.

3
  • 2
    The document recommends enabling StrictHostKeyChecking and later recommends disabling it. I suspect it isn't a very carefully edited document. My advice is to trust your own judgment, and use host keys unless there's a good reason not to.
    – aecolley
    Commented Aug 29, 2014 at 17:06
  • @aecolley I've noticed that as well. I have submitted a feedback to them. Will see if they come back to me. Commented Sep 2, 2014 at 5:41
  • 1
    I've elaborated below, but it boils down to context -- the page you're looking at is giving advice for creating new images, not for generally securing a machine. I'll get the docs updated to include more detail around when and why you'd want to delete your host keys, as the reasons aren't clear.
    – Benson
    Commented Sep 9, 2014 at 21:19