• admin@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    3
    ·
    4 days ago

    “The attack against the OpenSSH client (CVE-2025-26465) succeeds regardless of whether the VerifyHostKeyDNS option is set to “yes” or “ask” (its default is “no”), requires no user interaction, and does not depend on the existence of an SSHFP resource record (an SSH fingerprint) in DNS,” explains Qualys.

    Thankfully is not enabled by default…