[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20140901114113.25161.qmail@mail.securityfocus.com>
Date: Mon, 1 Sep 2014 13:41:02 +0200
From: Micha Borrmann <micha.borrmann@...s.de>
To: <bugtraq@...urityfocus.com>
Subject: Re: SSH host key fingerprint - through HTTPS
Nice tool, but it is also possible, to use DNSSEC to validate SSH
fingerprints, which is much more comfortable and more secure.
Am 01.09.2014 um 06:41 schrieb John Leo:
> This tool displays SSH host key fingerprint - through HTTPS.
>
> SSH is about security; host key matters a lot here; and you can know for
> sure by using this tool. It means you know precisely how to answer this
> question:
> The authenticity of host 'blah.blah.blah (10.10.10.10)' can't be
> established.
> RSA key fingerprint is
> a4:d9:a4:d9:a4:d9a4:d9:a4:d9a4:d9a4:d9a4:d9a4:d9a4:d9.
> Are you sure you want to continue connecting (yes/no)?
>
> https://checkssh.com/
>
> We hackers don't want to get hacked. :-) SSH rocks - when host key is
> right. Enjoy!
Download attachment "smime.p7s" of type "application/pkcs7-signature" (3216 bytes)
Powered by blists - more mailing lists