On Mon, Jun 25, 2012 at 9:52 PM, Tomasz Marszal <kap...@toya.net.pl> wrote: [...] > Does it prevent man in the middle attack ?
The RSA key exchange method? Yes, the last step is that the server signs a bunch of things including the shared secret and the ephemeral server key with the server's host key, which an MITM can't do since it doesn't have access to the corresponding private key. -- Darren Tucker (dtucker at zip.com.au) GPG key 8FF4FA69 / D9A3 86E9 7EEE AF4B B2D4 37C9 C982 80C7 8FF4 FA69 Good judgement comes with experience. Unfortunately, the experience usually comes from bad judgement.