We use cookies
We use cookies to optimize our website. By continuing to browse the site, you agree to our use of cookies.
New design
Control panel
  • Русский
  • Українська
  • English
  • UAH
  • USD
  • RUB
  • EUR
  • 0-800-307-307 Hotline
  • +38 (044) 392-74-33 Kiev
  • +38 (057) 728-39-00 Kharkiv
  • +38 (056) 794-38-31 Dnipro
  • +38 (032) 229-58-93 Lviv
  • +38 (048) 738-57-70 Odessa
  • +38(093) 170-15-42  Life
  • +38 (067) 400-88-44 Kievstar
  • +1(888)393-24-51  USA, Toll free
  • +44(131)507-01-14  Great Britain
  • +7 (499) 348-28-61 Moscow

2.10.1.4. POSSIBLE DNS SPOOFING

When connecting to the server via SSH, you may encounter the error “WARNING: POSSIBLE DNS SPOOFING DETECTED!". It usually looks like this:

This error occurs due to a change in the server certificate and its IP address. This situation can arise:

  • Or in the case when a deliberate deception of your device is really performed and the attackers spoof the IP address of the host to which you are trying to connect (in the example example.ftp.tools).
  • Or in the case of transferring a hosting account between our servers (for example, when migrations or for technical reasons). In this case, the error will most often be paired with the error “REMOTE HOST IDENTIFICATION HAS CHANGED!».

To fix it, you need to delete the existing key for the address. This can be done:

  • By running the command:
    ssh-keygen -R example.ftp.tools

    Instead example.ftp.tools specify the address you are connecting to.

  • By removing the specifying key in the file known_hosts... Usually this file is located in /home/user/.ssh/known_hosts on your device. In this file, the entries will look like this:Specifically, in this example, you need to remove all text from example.ftp.tools to xxxxxxx.ftp.tools, i.e: