On Sun, 2011-02-20 at 10:36 +0100, Karl Hammar wrote: > Peter Clifton: > ... > > generate, and setup .ssh/config with these lines: > > > > """ > > Host git.gpleda.org > > > > Port 5022 > > RSAAuthentication yes > > IdentityFile ~/.ssh/keys/id_rsa.gpleda.org > > """ > ... > > Don't you know that protocol version 1 i vulnerable for a > man-in-the-middle attack? No, I didn't know that. Does it require a different type of key to be generated and used, or just removing that option to become secure again? -- Peter Clifton Electrical Engineering Division, Engineering Department, University of Cambridge, 9, JJ Thomson Avenue, Cambridge CB3 0FA Tel: +44 (0)7729 980173 - (No signal in the lab!) Tel: +44 (0)1223 748328 - (Shared lab phone, ask for me)
Attachment:
signature.asc
Description: This is a digitally signed message part
_______________________________________________ geda-user mailing list geda-user@xxxxxxxxxxxxxx http://www.seul.org/cgi-bin/mailman/listinfo/geda-user