[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: SecurityPortal re: Attacks on SSH and SSL
- To: misc_(_at_)_openbsd_(_dot_)_org
- Subject: Re: SecurityPortal re: Attacks on SSH and SSL
- From: Lars Hecking <lhecking_(_at_)_nmrc_(_dot_)_ie>
- Date: Mon, 18 Dec 2000 18:07:33 +0000
- Mail-followup-to: misc_(_at_)_openbsd_(_dot_)_org
> OpenSSH will print a note telling you that the key on the other end
> has been changed. It will warn about a possible man in the middle
> attack. It will force you to remove the old key before you will be able
> to connect the the remote host. If you read all the text and then removes
> the old key without checking with the other end you are stupid.
On a related note, is it possible (or does it actually make sense) to
generate a fingerprint for a DSA host key?
$ ssh-keygen -l -f /etc/ssh_host_dsa_key
/etc/ssh_host_dsa_key is not a valid key file.
Visit your host, monkey.org