-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
hi,
for people accessing the Toolserver without their usual SSH client fingerprint database, there is now a secure way to verify the fingerprint of each system:
https://fingerprints.toolserver.org
the SSL certificate is signed with a valid CA key which should be accepted by all browsers.
- river.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
River Tarnell schrieb:
hi,
for people accessing the Toolserver without their usual SSH client fingerprint database, there is now a secure way to verify the fingerprint of each system:
https://fingerprints.toolserver.org
the SSL certificate is signed with a valid CA key which should be accepted by all browsers.
- river.
Neat, thanks river.
Hm, migth by cool to put our personal key's fingerprints on there too, what do you think?
- -- daniel
_______________________________________________ Toolserver-l mailing list Toolserver-l@lists.wikimedia.org https://lists.wikimedia.org/mailman/listinfo/toolserver-l
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
Daniel Kinzler:
Hm, migth by cool to put our personal key's fingerprints on there too, what do you think?
that seems reasonable. the source is at hemlock:/export/www/fingerprints.toolserver.org.
- river.
River Tarnell schrieb:
Daniel Kinzler:
Hm, migth by cool to put our personal key's fingerprints on there too, what do you think?
that seems reasonable. the source is at hemlock:/export/www/fingerprints.toolserver.org.
- river.
I have added my and river's pgp key fingerprints, so you can check signatures for mail and other stuff against it.
-- daniel
_______________________________________________ Toolserver-l mailing list Toolserver-l@lists.wikimedia.org https://lists.wikimedia.org/mailman/listinfo/toolserver-l
toolserver-l@lists.wikimedia.org