Nov. 24, 2022, 2:10 a.m. | Sebastian Neef, Nils Wisiol

cs.CR updates on arXiv.org arxiv.org

The SSH protocol is commonly used to access remote systems on the Internet,
as it provides an encrypted and authenticated channel for communication. If
upon establishing a new connection, the presented server key is unknown to the
client, the user is asked to verify the key fingerprint manually, which is
prone to errors and often blindly trusted. The SSH standard describes an
alternative to such manual key verification: using the Domain Name System (DNS)
to publish the server key information …

analysis dns fingerprint host key large scale ssh verification

Information Security Engineers

@ D. E. Shaw Research | New York City

GG9b-Assoc Eng II, Services

@ HARMAN International | IN Bengaluru EOIZ Indust Area Campus HCS

Lead Security Operations Engineer

@ S&P Global | US - NY New York City - 55 WATER ST 35 HRS

Information Systems Security Manager (ISSM)

@ STR | Arlington, VA

Sr. Site Reliability Engineer - Incident Response

@ HashiCorp | India - Bengaluru

Function Cluster Architect Product Security

@ ASML | Veldhoven, Building 03, Netherlands