← Back to context

Comment by antoniomika

1 day ago

Our host keys are published here and are durable: https://pico.sh/host-keys

So approximately nothing?

  • Perhaps giving a bit more information than throwing out random acronyms related to SSH would be a bit more fruitful in terms of responses.

    What about TOFU and MITM would you like them to respond to? TOFU isn't inherently a bad thing. Neither is MITM. It depends on the threat model, the actors involved, etc.

    Your comment (and the snarky followup) imply they're doing something wrong, but it's unclear what.

  • There is nothing that can be done beyond what they are doing?

    You can receive their public keys out-of-band through an https-authenticated connection. Which means their approach to "the initial trust problem" is _not_ "trust on first use".

    • I don't know what other solutions there are to TOFU, but maybe it's nice if there's something like a standardised /.well-known/ssh-keys.json path for public ssh servers like github and pico.sh.

      3 replies →