I'm getting sick of seeing log entries for SSH dictionary attacks, the
latest coming in the middle of me watching a live log while trying to
solve a problem.
I'd like to switch off password access and only allow private key
access, but personally I have a problem with storing raw private keys
on memory sticks, or machine hardrives, I feel its lower security than
a memorised password.
Does anyone know if there is a SSH client which can work with
something like a PKCS12 private keystore where a password is needed to
unlock the private key thus allowing the private key to be stored on
insecure devices such as client pc's and memory sticks?
I know there's PKCS11 for smartcard readers and the like, but thats a
little extravagant for my needs.
Maintained by the ILUG website team. The aim of Linux.ie is to
support and help commercial and private users of Linux in Ireland. You can
display ILUG news in your own webpages, read backend
information to find out how. Networking services kindly provided by HEAnet, server kindly donated by
Dell. Linux is a trademark of Linus Torvalds,
used with permission. No penguins were harmed in the production or maintenance
of this highly praised website. Looking for the
Indian Linux Users' Group? Try here. If you've read all this and aren't a lawyer: you should be!