On Thu, 2005-02-10 at 18:06 +0100, Bruno Hertz wrote:
> On Thu, 2005-02-10 at 10:42 -0600, Daniel Wright wrote:
> > You can always set up ssh to use host keys. Here are two howto's on what 
> > else? How to set them up.
> > 
> > http://www.securityfocus.com/infocus/1806  Part 1
> > http://www.securityfocus.com/infocus/1810  Part 2
> 
> Great links. One may add that first actually deals with host keys, which
> identify the server to the client, and the second with identities resp.
> pubkeys, which identify the client to the server. I guess it's actually
> the latter item we are currently talking about. Host keys are essential
> as well of course, to prevent phishing and the likes.

If you are going to rely on keys, you need to have both directions
identified. Nothing like sending a valid key to a man-in-the-middle. 
-- 
Steven Critchfield <[EMAIL PROTECTED]>

_______________________________________________
Asterisk-Users mailing list
Asterisk-Users@lists.digium.com
http://lists.digium.com/mailman/listinfo/asterisk-users
To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-users

Reply via email to