When using an ssh client (e.g. openssh), the ssh client receives a fingerprint from the server to which it connects. When the user accepts the fingerprint the connection will be established and the fingerprint is stored locally. The next time a connection is made to the same server the ssh client compares the fingerprint of the server to the one that was saved from the previous session. If the fingerprint does not match an error message is displayed and the connection will be aborted. This mechanism prevents a man-in-the-middle attack. A man-in-the-middle can simply retrieve sensitive information like username and passwords.
NA does not check for the fingerprint in the web gui nor the ssh console.
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.