NETGEAR is aware of a growing number of phone and online scams. To learn how to stay safe click here.

Forum Discussion

geojay's avatar
geojay
Guide
Jul 25, 2018

RN214: WARNING: POSSIBLE DNS SPOOFING DETECTED!

I have a local RN214 which backs up via RSYNC over SSH to a remote RN204. The remote RN204 recently needed to be rebuilt with new disks and following this, I get the following warning as part of the back up notification emails. What do I need to do in the UI to resolve this?

Thanks!

@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ @ WARNING: POSSIBLE DNS SPOOFING DETECTED! @ @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ The ECDSA host key for soper.dyndns-free.com has changed, and the key for the corresponding IP address 80.189.121.250 is unknown. This could either mean that DNS SPOOFING is happening or the IP address for the host and its host key have changed at the same time. @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ @ WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED! @ @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ IT IS POSSIBLE THAT SOMEONE IS DOING SOMETHING NASTY! Someone could be eavesdropping on you right now (man-in-the-middle attack)! It is also possible that a host key has just been changed. The fingerprint for the ECDSA key sent by the remote host is 8d:85:6f:eb:76:9c:ad:07:f3:b1:60:84:ce:8e:29:6f. Please contact your system administrator. Add correct host key in /root/.ssh/known_hosts to get rid of this message. Offending ECDSA key in /root/.ssh/known_hosts:2 remove with: ssh-keygen -f "/root/.ssh/known_hosts" -R soper.dyndns-free.com Keyboard-interactive authentication is disabled to avoid man-in-the-middle attacks.

1 Reply

Replies have been turned off for this discussion
  • Marc_V's avatar
    Marc_V
    NETGEAR Employee Retired

    Hi geojay

     

    This usually happens when a NAS has been reset then uses the same IP from the previous build.

     

    You should be able to get rid of the message by SSH and key in the command provided

     

    The fingerprint for the ECDSA key sent by the remote host is
    8d:85:6f:eb:76:9c:ad:07:f3:b1:60:84:ce:8e:29:6f.
    Please contact your system administrator.
    Add correct host key in /root/.ssh/known_hosts to get rid of this message.
    Offending ECDSA key in /root/.ssh/known_hosts:2
      remove with: ssh-keygen -f "/root/.ssh/known_hosts" -R soper.dyndns-free.com
    Keyboard-interactive authentication is disabled to avoid man-in-the-middle attacks.

     

    Hope this helps!

     

     

    Regards

     

NETGEAR Academy

Boost your skills with the Netgear Academy - Get trained, certified and stay ahead with the latest Netgear technology! 

Join Us!

ProSupport for Business

Comprehensive support plans for maximum network uptime and business peace of mind.

 

Learn More