>> Fetchmail, msmtp, etc can all connect to a host,
>> take that cert fingerprint, compare it to the one you've
>> configured, and drop the connection if they differ.
>
> That may work against some adversaries but not against very clever 
> adversaries. He can let the first connection alone and tamper with the other 
> one.

It is first assumed one securely obtains and verifies certs
so you don't have this problem.
_______________________________________________
tor-talk mailing list
tor-talk@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

Reply via email to