Before connecting to a remote system with SSH, it's best to know what the key fingerprint is, to make sure the remote system is indeed the computer you think it is and not some eavesdropping impersonator.
Add -E md5 or -E sha256 to force the hashing algorithm.