is MITM attack possible when we verify only the jump host’s fingerprint (host key)?
I am connecting to remote hosts via jump host where I verify only the jump host’s host key, but turn off host key verification for the target hosts.
the ssh command arguments look like this:
-o StrictHostKeyChecking=no -o ProxyCommand=&quo… Continue reading is MITM attack possible when we verify only the jump host’s fingerprint (host key)?