Do not!
Verifying host key fingerprint is an integral part of securing your connection. Blindly accepting any host key will make you vulnerable to the man-in-the-middle attacks.
Instead, use the -hostkey
switch to provide the fingerprint of the expected/known host key.
c:/netapp/python/plink.exe [email protected] -pw xxx -hostkey 9d:08:37:a8:d0:34:a3:d2:d8:e5:09:7e:63:08:a9:1b your command here
Do not use hacks like feeding y
to Plink input. Not only it is insecure. But if there is no host key prompt (because the host key is already cached), the y
will end up as an input to the command you are executing. What may lead to undesired results.
与恶龙缠斗过久,自身亦成为恶龙;凝视深渊过久,深渊将回以凝视…