Hi all, I’m currently changing the X.509 certificate and RSA keys for frozenfish, as the old certificate has expired, and I’m not too sure about the private keys’ security. The new key is generated on MirBSD, of course ☺ and not on Debian.
SSH and SSL additionally now use the same key, like in MirBSD. SSH connections: • RSA key fingerprint is c4:fe:a2:8e:6b:cb:9e:34:55:80:0d:2a:b6:8b:a2:ac. • DSA has been disabled for security (host key only, not user key) • RSAv1 already was disabled SSL connections: • new certificate signed by CAcert.org, like the old one was. Class 1 root. bye, //mirabilos -- [...] if maybe ext3fs wasn't a better pick, or jfs, or maybe reiserfs, oh but what about xfs, and if only i had waited until reiser4 was ready... in the be- ginning, there was ffs, and in the middle, there was ffs, and at the end, there was still ffs, and the sys admins knew it was good. :) -- Ted Unangst über *fs _______________________________________________ freewrt-developers mailing list [email protected] https://www.freewrt.org/lists/listinfo/freewrt-developers
