Roberto C. Sánchez wrote:
> On Sun, Jun 10, 2007 at 08:33:21PM -0400, Kamaraju S Kusumanchi wrote:
>   
>> Somehow, I am not comfortable with this. I have read in many places that key
>> authentication is the most secure method and I agree with them. However it
>> is not very convenient. Consider this situation.
>>
>> Say, I ssh into machineA from machineB. However machineB is not always known
>> apriori. I can go to my friend's machine and want to ssh into machineA. In
>> that case, how do I obtain get the key? Carrying the key with a USB stick
>> is one option. But again that is also inconvenient for me. I guess
>> convenience and security are opposite ends of the spectrum.
>>
>>     
> Quite right.  In your case, it may not work.  If you use your friend's
> machine frequently enough, you might want to install a key on it (make
> sure to protect it with a strong passphrase).  If you are always
> bouncing around, that may not be good enough, however.  If you have a
> laptop and normally use that, then a key-only scheme can probably work
> for you.
>
> It all depends on your circumstances.
>
> Regards,
>
> -Roberto
>
>   
Roberto,

    When you talk about logging into the computer without a password,
are you talking about SSH?  If so, how do you handle doing that in, say,
an internet cafe?  Thanks. ~Telly


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to