On 3/26/2013 8:39 AM, Roger Serwy wrote:
> 
>> Well if a MITM attacker tries to use your ssh access to do anything
>> nasty,
>> another developer will probably notice quite quickly.
>> (the only "nasty thing" the ssh access allows you to do is "hg push",
>> IIRC; still, that can trigger code execution on the buildbots)
>>
>>
> Sure, but it would be better to actually have the fingerprints to avoid
> the MITM attack altogether.

I completely agree. "We'll notice the damage" is not a great reason to
avoid publishing the fingerprints.

> Can someone log into hg.python.org and get the public keys for the server?

Not me. But from my hosts, I get:
RSA key fingerprint is ec:98:fe:7b:e1:0f:88:c5:93:37:83:64:a4:cc:aa:01.

-- 
Eric.
_______________________________________________
python-committers mailing list
python-committers@python.org
http://mail.python.org/mailman/listinfo/python-committers

Reply via email to