@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@There could be solved by easily removed the offending line in known_hosts file.
@ WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED! @
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
IT IS POSSIBLE THAT SOMEONE IS DOING SOMETHING NASTY!
Someone could be eavesdropping on you right now (man-in-the-middle attack)!
It is also possible that the DSA host key has just been changed.
The fingerprint for the DSA key sent by the remote host is
14:b0:b4:42:01:5f:d6:20:69:4f:5b:e6:10:cb:65:cf.
Please contact your system administrator.
Add correct host key in /root/.ssh/known_hosts to get rid of this message.
Offending key in /root/.ssh/known_hosts:3
DSA host key for 10.0.0.3 has changed and you have requested strict checking.
Host key verification failed.
It's important to know that there are essentially two versions of
SSH
out in the wild. On most GNU/Linux systems the OpenSSH implementation
is
installed which (these days) defaults to SSH protocol 2. On Windows SSH
Shell, the commercial version of SSH is installed (also using protocol
2).
The above method works in liman server.
Reference: