Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. TLS and SSH rely on Certificate Authorities (CAs) for authentication, but they also present a vector for Man in the Middle attacks.

TLS and SSH rely on Certificate Authorities (CAs) for authentication, but they also present a vector for Man in the Middle attacks.

Scheduled Pinned Locked Moved Uncategorized
webdevlinuxsecurityinfoseccybersecurity
4 Posts 3 Posters 2 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • fedora@fosstodon.orgF This user is from outside of this forum
    fedora@fosstodon.orgF This user is from outside of this forum
    fedora@fosstodon.org
    wrote last edited by
    #1

    TLS and SSH rely on Certificate Authorities (CAs) for authentication, but they also present a vector for Man in the Middle attacks. What if you could set up your own CA to reduce your exposure?

    ➡️ https://fedoramagazine.org/make-a-private-ca-with-step-ca/

    #WebDev #Linux #Security #InfoSec #Cybersecurity #Fedora

    giggls@karlsruhe-social.deG 1 Reply Last reply
    1
    0
    • fedora@fosstodon.orgF fedora@fosstodon.org

      TLS and SSH rely on Certificate Authorities (CAs) for authentication, but they also present a vector for Man in the Middle attacks. What if you could set up your own CA to reduce your exposure?

      ➡️ https://fedoramagazine.org/make-a-private-ca-with-step-ca/

      #WebDev #Linux #Security #InfoSec #Cybersecurity #Fedora

      giggls@karlsruhe-social.deG This user is from outside of this forum
      giggls@karlsruhe-social.deG This user is from outside of this forum
      giggls@karlsruhe-social.de
      wrote last edited by
      #2

      @fedora Huh? ssh does not use CAs it uses a known_hosts file.

      ben@snac.benbuhse.comB 1 Reply Last reply
      0
      • giggls@karlsruhe-social.deG giggls@karlsruhe-social.de

        @fedora Huh? ssh does not use CAs it uses a known_hosts file.

        ben@snac.benbuhse.comB This user is from outside of this forum
        ben@snac.benbuhse.comB This user is from outside of this forum
        ben@snac.benbuhse.com
        wrote last edited by
        #3
        You can use CAs for SSH, e.g. https://www.lorier.net/docs/ssh-ca.html

        CC: @fedora@fosstodon.org
        giggls@karlsruhe-social.deG 1 Reply Last reply
        0
        • ben@snac.benbuhse.comB ben@snac.benbuhse.com
          You can use CAs for SSH, e.g. https://www.lorier.net/docs/ssh-ca.html

          CC: @fedora@fosstodon.org
          giggls@karlsruhe-social.deG This user is from outside of this forum
          giggls@karlsruhe-social.deG This user is from outside of this forum
          giggls@karlsruhe-social.de
          wrote last edited by
          #4

          @ben @fedora It is possible to do so but this is not the default at least on Debian/Ubuntu based distros. Is this different in Fedora?

          1 Reply Last reply
          0
          • R relay@relay.mycrowd.ca shared this topic
          Reply
          • Reply as topic
          Log in to reply
          • Oldest to Newest
          • Newest to Oldest
          • Most Votes


          • Login

          • Login or register to search.
          • First post
            Last post
          0
          • Categories
          • Recent
          • Tags
          • Popular
          • World
          • Users
          • Groups