AFAIK almost nobody checks the fingerprints when using SSH. Also, IMHO,
SSH is more vulnerable than ESessions because people are more likely to
check a SAS than a fingerprint, and because SSH is typically negotiated
over an unencrypted Internet connection whereas ESessions should pass
over TLS c2s and s2s.
I've not seen anyone drop SSH and go back to Telnet.
If you (sometimes) don't check SSH fingerprints, and you still believe
SSH has value, then can you reasonably argue that something like
ESessions doesn't?
- Ian