the cert is not the same as the transport. It's not certs that make TLS vulnerable, it's TLS.
SSH only has to make sure that it gets the public part of the key on the server. Then it's the same as ssh as normal
why does SSH continue this 'not invented here' crap with certs?? I don't care if the new certs are better. I don't have any new certs but I've got loads of x509 certs and I'm not going to throw them out.....
Interesting posts so far, but they all assume that the host is running on the metal. What are the recommendations for running VM guests which tend to have crap disk access speeds?
I've turned swap off and had real performance improvements, but hell, occasionally it crashes (not a huge problem).
An algorithm must be seen to be believed. -- D.E. Knuth