> "Viktor" == Viktor Rosenfeld <[EMAIL PROTECTED]> writes:
Viktor> passphrase. My question is, if that (empty passphrase on
Viktor> the local network) really is a security hole? My
Viktor> reasoning is, that if any machine (except for the
Viktor> firewall) is compromised, the
> "kmself" == kmself writes:
kmself> Ok. So, to ensure key integrity, I do what?
This is something (IMHO) ssh doesn't address satisfactory (Also I
often wonder why ssh needs to use a new key format of its own, rather
then reuse keys generated, say by gpg, where a web of trust can
exist
Brian May wrote:
> Of course. Use ssh-agent means you don't have to enter your passphrase
> every-time though.
Didn't know about ssh-agent. Tried it out though, and it works like a
charm. BTW, I created an .xsession file with the following content to
run ssh-add:
#!/bin/sh
if
on Mon, Nov 20, 2000 at 04:08:26PM +1100, Brian May ([EMAIL PROTECTED]) wrote:
> > "kmself" == kmself writes:
>
> kmself> Sorry?
>
> kmself> - I establish a private RSA authentication key for ssh.
> kmself> - I send the corresponding public key to remoteserver. -
> kmself
> "kmself" == kmself writes:
kmself> Sorry?
kmself> - I establish a private RSA authentication key for ssh.
kmself> - I send the corresponding public key to remoteserver. -
kmself> You intercept the transmission and replace my public key
kmself> with yours.
I assume
on Mon, Nov 20, 2000 at 09:22:16AM +1100, Brian May ([EMAIL PROTECTED]) wrote:
> > "Dave" == Dave Sherohman <[EMAIL PROTECTED]> writes:
>
> Dave> OK, now you's lost me... I thought the big advantage of
> Dave> public keys was exactly that - they're public. You don't
> Dave> have
> "Dave" == Dave Sherohman <[EMAIL PROTECTED]> writes:
Dave> OK, now you's lost me... I thought the big advantage of
Dave> public keys was exactly that - they're public. You don't
Dave> have to worry about transferring them securely, so long as
Dave> the corresponding private
On Sun, Nov 19, 2000 at 01:16:10PM +1100, Brian May wrote:
> I am afraid you have lost me here. Are you asking how you can securely
> transfer the public keys of your clients (not an easy task),
OK, now you's lost me... I thought the big advantage of public keys was
exactly that - they're public.
> "Viktor" == Viktor Rosenfeld <[EMAIL PROTECTED]> writes:
Viktor> What's the advantage of RSA Authentication vs. Password
Viktor> Authentication except that under the first one the sshd
Viktor> server does not trust the client unless he has authorized
Viktor> himself with a ke
9 matches
Mail list logo