Wouldn't constantly changing ssh keys make it more secure?
On 1/2/07, Mike Perry <[EMAIL PROTECTED]> wrote:
Deliberately breaking threading so this doesn't fall through the cracks. Thus spake Robert Hogan ([EMAIL PROTECTED]): > > Got this when testing an ssh connection: > > WARNING: DSA key found for host shell.sf.net > in /home/robert/.ssh/known_hosts:8 > DSA key fingerprint 4c:68:03:d4:5c:58:a6:1d:9d:17:13:24:14:48:ba:99. > The authenticity of host 'shell.sf.net (66.35.250.208)' can't be established > but keys of different type are already known for this host. > RSA key fingerprint is cf:9b:db:c4:53:c3:f0:0d:e8:c4:15:33:61:71:01:ca. > Are you sure you want to continue connecting (yes/no)? no > > > Tor first attempted to attach a circuit with toxischnet as it's exit. This > didn't work, so it then used tormentor. I then got the above. > > I subsequently used both toxischnet and tormentor to connect without any key > authentication issues. The RSA fingerpint is not listed by sourceforge. > > http://sourceforge.net/docs/G04/en/#fingerprintlist > > Malice? Misconfiguration of some sort? Anyone care to test either of these > exits? Hrmm.. My scanner seems to be getting hung on some bug (possibly one that I'm tickling in Tor or possibly my own), so I haven't seen this during automatic scanning yet, but I can confirm manually that tormentor IS in fact regularly changing ssh keys. It should be delisted as an exit ASAP. toxischnet is currently hibernating, so its hard to say on that one. -- Mike Perry Mad Computer Scientist fscked.org evil labs

