On Thursday 5 May, 2011 17:15:11 Perry Thompson wrote:
> On 05/05/2011 06:46 PM, cac...@quantum-sci.com wrote:
> > On Thursday 5 May, 2011 15:09:02 Brian wrote:
> >> Use a strong password or ssh keys for access to the server. The question
> >> is whether you trust the machine you use at work.
> > 
> > OK, say you -don't- trust your machine at work.  Workarounds?
> > 
> > 
> I suppose you could keep your public key with you on a USB drive and
> only put it on the computer when you need it, however I'm not sure how
> secure that would be :/

I've just found that it is recommended to always set a passphrase when 
generating a key.  This makes it useless to someone else who tries to use it.  
The passphrase is evaluated on the client, rather than the server.  Brute-force 
attempts can never succeed.

I've also found that indeed to shut off passwords on the server it is 
sshd_config|PasswordAuthentication no.    But you must remember that this shuts 
you out when on a machine that's not in the server's authorized_keys.  

And it's good practice to generate a key on each client and put that in the 
server's authorized_keys, rather than using all the same key.  So if one 
machine is compromised, the rest won't be.


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/201105051732.03420.cac...@quantum-sci.com

Reply via email to