>> Fetchmail, msmtp, etc can all connect to a host, >> take that cert fingerprint, compare it to the one you've >> configured, and drop the connection if they differ. > > That may work against some adversaries but not against very clever > adversaries. He can let the first connection alone and tamper with the other > one.
It is first assumed one securely obtains and verifies certs so you don't have this problem. _______________________________________________ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk