On Thu, Feb 10, 2005 at 01:30:03PM -0600, Steven Critchfield wrote: > If you are going to rely on keys, you need to have both directions > identified. Nothing like sending a valid key to a man-in-the-middle.
That's indeed one atvantage of keys over passwords. Even if the server is compromised, your secret keys are safe. The server only needs to know your public keys, and some proofs that you have the matching private key (using it to sign some random data the server sends). Anyway, with ssh you'll normally be notified of a spoofed host, because the host key won't match. A decent ssh client won't let you to connect or will give you a very nasty warning. Unless it is the first time you connect from that host/account to the server. sshophilicly yours -- Tzafrir Cohen | New signature for new address and | VIM is http://tzafrir.org.il | new homepage | a Mutt's [EMAIL PROTECTED] | | best ICQ# 16849755 | Space reserved for other protocols | friend _______________________________________________ Asterisk-Users mailing list [email protected] http://lists.digium.com/mailman/listinfo/asterisk-users To UNSUBSCRIBE or update options visit: http://lists.digium.com/mailman/listinfo/asterisk-users
