The keys should also have a password incase of such problems and it is
offered when you type ssh-keygen -t rsa.

this is so much more secure as only a host with a recognised public key
can even attempt to login.

If you only allow rsa authentication,  brute force attacks are no longer
an option they need the key and then to guess the password

Simon

On Fri, 2002-10-11 at 02:31, Peter Kiem wrote:
> Hi,
> 
> This might seem a stupid question but I often see people recommending that 
> you never log into SSH with password but rather use keys.
> 
> Doesn't this create a security issue as if someone manages to break into one 
> computer you own they can simply SSH straight into the other systems without 
> passwords using the keys stored on that computer?
> 
> At least if you are using passwords they need to work out the other 
> computer's passwords before they can SSH into them?
> 
> -- 
> Regards,
> +-----------------------------+---------------------------------+
> | Peter Kiem            .^.   | E-Mail    : <[EMAIL PROTECTED]> |
> | Zordah IT             /V \  | Mobile    : +61 0414 724 766    |
> |   IT Consultancy &  /(   )\ | WWW       : www.zordah.net      |
> |   Internet Hosting   ^^-^^  | ICQ       : "Zordah" 866661     |
> +-----------------------------+---------------------------------+
> 
> 
> 
> 
> 
> -- 
> redhat-list mailing list
> unsubscribe mailto:[EMAIL PROTECTED]?subject=unsubscribe
> https://listman.redhat.com/mailman/listinfo/redhat-list




-- 
redhat-list mailing list
unsubscribe mailto:[EMAIL PROTECTED]?subject=unsubscribe
https://listman.redhat.com/mailman/listinfo/redhat-list

Reply via email to