Stuart Henderson wrote:
On 2008-05-18, Mark Shroyer <[EMAIL PROTECTED]> wrote:
I've set up a nice secondary authentication mechanism on a Linux server.
I use this when I must shell in from, e.g., a computer lab, and I don't
have an authorized SSH private key on my workstation.  To login without
a private key, I must:

 1) Enter my account's current S/Key one-time password

and

 2) Enter my Unix password

in sequence.

In what way does typing your password in to an untrusted machine
improve security?


it's 2 factor authentication, duh! i read about that on the intarnetz so it must be a good idea regardless of the 2 factors i choose.

;)

Reply via email to