lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Mon, 1 Sep 2014 13:41:02 +0200
From: Micha Borrmann <micha.borrmann@...s.de>
To: <bugtraq@...urityfocus.com>
Subject: Re: SSH host key fingerprint - through HTTPS
Nice tool, but it is also possible, to use DNSSEC to validate SSH
fingerprints, which is much more comfortable and more secure.
Am 01.09.2014 um 06:41 schrieb John Leo:
> This tool displays SSH host key fingerprint - through HTTPS.
>
> SSH is about security; host key matters a lot here; and you can know for
> sure by using this tool. It means you know precisely how to answer this
> question:
> The authenticity of host 'blah.blah.blah (10.10.10.10)' can't be
> established.
> RSA key fingerprint is
> a4:d9:a4:d9:a4:d9a4:d9:a4:d9a4:d9a4:d9a4:d9a4:d9a4:d9.
> Are you sure you want to continue connecting (yes/no)?
>
> https://checkssh.com/
>
> We hackers don't want to get hacked. :-) SSH rocks - when host key is
> right. Enjoy!
Download attachment "smime.p7s" of type "application/pkcs7-signature" (3216 bytes)
Powered by blists - more mailing lists