TLS and SSH rely on Certificate Authorities (CAs) for authentication, but they also present a vector for Man in the Middle attacks.
Uncategorized
4
Posts
3
Posters
2
Views
-
TLS and SSH rely on Certificate Authorities (CAs) for authentication, but they also present a vector for Man in the Middle attacks. What if you could set up your own CA to reduce your exposure?
️ https://fedoramagazine.org/make-a-private-ca-with-step-ca/ -
TLS and SSH rely on Certificate Authorities (CAs) for authentication, but they also present a vector for Man in the Middle attacks. What if you could set up your own CA to reduce your exposure?
️ https://fedoramagazine.org/make-a-private-ca-with-step-ca/@fedora Huh? ssh does not use CAs it uses a known_hosts file.
-
@fedora Huh? ssh does not use CAs it uses a known_hosts file.
-
-
R relay@relay.mycrowd.ca shared this topic