ARP-spoofing defense

Dave Smith dave at
Wed Mar 14 13:01:04 MDT 2007

Michael L Torrie wrote:
> Additionally this is why SSL uses certificates that should be verified
> to prove that the host is who it says it is. Also ssh key fingerprints
> should always be verified.  How often do we ssh into a box and just
> automatically type "yes" to the fingerprint authorization?


Oh sorry. I thought that was an ssh question and habit took over.


More information about the PLUG mailing list