>       wrong !  With the public key and the root password known,
>       and files appropriately configured, the "attacker" won't
>       be prompted for a password.
>
>       If the root password is known in any senario then "is all over" !

Can you clarify what you mean here?

If you force key authentication and disable password authentication, the 
attacker won't be able to log in unless they have your private key and your 
passphrase. The password is only useful if (1) the attacker can log in as 
another user and 'su' to root (something that you can configure away with the 
proper PAM settings) or (2) the attacker has local console access (in which 
case they really don't need the password anyway) or (3) they can break the 
strong crypto employed by SSH. There are always possibilities of another 
vulnerability on your system or a vulnerability in the SSH daemon, but these 
aren't faults of the protocol itself.

There are several excellent examples where people configured their servers to 
accept only key authentication, then challenged people to break into their 
server -- after publishing the root password on Internet forums. One of the 
biggest I remember was the LinuxPPC security challenge from several years 
back. No one won.

Key authentication is mathematically and practically more secure than password 
authentications. Requiring key authentication makes the password irrelevant.

> > I would guess that copying your private key to B would be a bad idea
>
>       correct - copy only public keys

Never copy keys, public or private. Forward them using an agent.

thornton



-- 
redhat-list mailing list
unsubscribe mailto:[EMAIL PROTECTED]?subject=unsubscribe
https://listman.redhat.com/mailman/listinfo/redhat-list

Reply via email to