Perspectives Improving SSH style Host Authentication with Network Probing