Checking the host key reduces the chances of person-in-the-middle attacks. We store the proxy key in a temporary file to allow it to be passed into the ssh command, similar to how it works for the temporary client private key.
Reviewing note (in case it's not obvious): enabling the "Hide whitespace changes" option makes the diff much clearer.
Checking the host key reduces the chances of person-in-the-middle attacks. We store the proxy key in a temporary file to allow it to be passed into the
ssh
command, similar to how it works for the temporary client private key.Reviewing note (in case it's not obvious): enabling the "Hide whitespace changes" option makes the diff much clearer.
https://gus.my.salesforce.com/a07B00000076l2iIAA