logoalt Hacker News

asalahliyesterday at 7:50 PM1 replyview on HN

It baffles me why VPS providers don't display the fingerprints on their dashboards or expose them through the API.


Replies

dspillettyesterday at 10:29 PM

A few do. Though a more common way of securing the loop is to take the desired user public key during the build process.

Assuming you trust that the host control panel (or API server) hasn't been hacked, which you are assuming anyway if you trust a host fingerprint given to you that way, that should be as secure. For a small bit of extra assurance, to protect from an extra very unlikely attack, generate a new key pair just for this VM's creation so that you know you aren't connecting to some other VM that happens to have a known public key of yours and you've been redirected to by DNS poisoning.