[Asterisk-Users] asterisk@home scary log
Steven Critchfield
critch at basesys.com
Thu Feb 10 12:30:03 MST 2005
On Thu, 2005-02-10 at 18:06 +0100, Bruno Hertz wrote:
> On Thu, 2005-02-10 at 10:42 -0600, Daniel Wright wrote:
> > You can always set up ssh to use host keys. Here are two howto's on what
> > else? How to set them up.
> >
> > http://www.securityfocus.com/infocus/1806 Part 1
> > http://www.securityfocus.com/infocus/1810 Part 2
>
> Great links. One may add that first actually deals with host keys, which
> identify the server to the client, and the second with identities resp.
> pubkeys, which identify the client to the server. I guess it's actually
> the latter item we are currently talking about. Host keys are essential
> as well of course, to prevent phishing and the likes.
If you are going to rely on keys, you need to have both directions
identified. Nothing like sending a valid key to a man-in-the-middle.
--
Steven Critchfield <critch at basesys.com>
More information about the asterisk-users
mailing list