Re: clarify error messages and documentation when using signed public keys

[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

 



On Sun, 2020-09-20 at 15:30 +0200, Christopher J. Ruwe wrote:
> "In an otherwise normal public/private key pair exchange, clients or
> servers may then trust any public key, provided it has been signed
> by a trusted CA, and verify it's signature on a certificate
> fingerprint, instead of trusting a set of individual user/host keys
> configured on a single host."

Sorry to have muddled that up again. It's not the fingerprint on which
the verification is done, it's the certificate.

So it should be

"In an otherwise normal public/private key pair exchange, clients or
servers may then trust any public key, provided it has been signed by
a trusted CA, and verify it's signature on the certificate of the CA,
instead of trusting a set of individual user/host keys configured on a
single host."

Please excuse the noise.
--
Christopher


_______________________________________________
openssh-unix-dev mailing list
openssh-unix-dev@xxxxxxxxxxx
https://lists.mindrot.org/mailman/listinfo/openssh-unix-dev



[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

[Index of Archives]     [Linux ARM Kernel]     [Linux ARM]     [Linux Omap]     [Fedora ARM]     [IETF Annouce]     [Security]     [Bugtraq]     [Linux]     [Linux OMAP]     [Linux MIPS]     [ECOS]     [Asterisk Internet PBX]     [Linux API]

  Powered by Linux