On Thu, 23 Nov 2006, Ewan Oughton wrote:
> SSH keys on their own are not the magic bullet, but surely passworded-keys
> are more secure than a password on it's own? Something you have, something
> you know?
Sure. But who has the key?
Also, you're looking at it from POV of a clueful user, not of an
admin with lusers who wants to protect a specific box. How does the
admin (try) apply password-strength policies to ssh-key passwords?
How can the admin even enforce that users protect keys with a
Paul Jakma paul at clubi.iepaul at jakma.org Key ID: 64A2FF6A
Endless Loop, n.:
see Loop, Endless.
Loop, Endless, n.:
see Endless Loop.
-- Random Shack Data Processing Dictionary
Maintained by the ILUG website team. The aim of Linux.ie is to
support and help commercial and private users of Linux in Ireland. You can
display ILUG news in your own webpages, read backend
information to find out how. Networking services kindly provided by HEAnet, server kindly donated by
Dell. Linux is a trademark of Linus Torvalds,
used with permission. No penguins were harmed in the production or maintenance
of this highly praised website. Looking for the
Indian Linux Users' Group? Try here. If you've read all this and aren't a lawyer: you should be!