NETGEAR is aware of a growing number of phone and online scams. To learn how to stay safe click here.
Forum Discussion
geojay
Jul 25, 2018Guide
RN214: WARNING: POSSIBLE DNS SPOOFING DETECTED!
I have a local RN214 which backs up via RSYNC over SSH to a remote RN204. The remote RN204 recently needed to be rebuilt with new disks and following this, I get the following warning as part of the ...
Marc_V
Jul 25, 2018NETGEAR Employee Retired
Hi geojay
This usually happens when a NAS has been reset then uses the same IP from the previous build.
You should be able to get rid of the message by SSH and key in the command provided
The fingerprint for the ECDSA key sent by the remote host is 8d:85:6f:eb:76:9c:ad:07:f3:b1:60:84:ce:8e:29:6f. Please contact your system administrator. Add correct host key in /root/.ssh/known_hosts to get rid of this message. Offending ECDSA key in /root/.ssh/known_hosts:2 remove with: ssh-keygen -f "/root/.ssh/known_hosts" -R soper.dyndns-free.com Keyboard-interactive authentication is disabled to avoid man-in-the-middle attacks.
Hope this helps!
Regards
Related Content
NETGEAR Academy
Boost your skills with the Netgear Academy - Get trained, certified and stay ahead with the latest Netgear technology!
Join Us!