[Asterisk-Users] asterisk@home scary log

Steven Critchfield critch at basesys.com
Thu Feb 10 12:30:03 MST 2005


On Thu, 2005-02-10 at 18:06 +0100, Bruno Hertz wrote:
> On Thu, 2005-02-10 at 10:42 -0600, Daniel Wright wrote:
> > You can always set up ssh to use host keys. Here are two howto's on what 
> > else? How to set them up.
> > 
> > http://www.securityfocus.com/infocus/1806  Part 1
> > http://www.securityfocus.com/infocus/1810  Part 2
> 
> Great links. One may add that first actually deals with host keys, which
> identify the server to the client, and the second with identities resp.
> pubkeys, which identify the client to the server. I guess it's actually
> the latter item we are currently talking about. Host keys are essential
> as well of course, to prevent phishing and the likes.

If you are going to rely on keys, you need to have both directions
identified. Nothing like sending a valid key to a man-in-the-middle. 
-- 
Steven Critchfield <critch at basesys.com>




More information about the asterisk-users mailing list