ARP-spoofing defense

Dave Smith dave at thesmithfam.org
Wed Mar 14 13:01:04 MDT 2007


Michael L Torrie wrote:
> Additionally this is why SSL uses certificates that should be verified
> to prove that the host is who it says it is. Also ssh key fingerprints
> should always be verified.  How often do we ssh into a box and just
> automatically type "yes" to the fingerprint authorization?
>   


yes

Oh sorry. I thought that was an ssh question and habit took over.

--Dave



More information about the PLUG mailing list