RE: SSH Security



> On Wed, 2005-12-07 at 09:35, STYMA, ROBERT E (ROBERT) wrote:
> > > Key based authentication is the right way to go. You should disable
> > > root ssh access completely.
> > >
> >
> > Key based authentication is good, but there is one caveat. Straight
> > key based allows you to log in directly without typing a password.
> > If you are ssh'ing from work to home from a UNIX machine, any sys-admin
> > with the root password on your work machine can become you and then
> > ssh to your home machine as you with no password. Maybe you don't care
> > if your sysadmin is dinking around in your home machine and maybe you
do.
> >
> > I am not saying not to use key based authentication, but it is not a
> > cure all.
>
> You are correct, there are no magic bullet solutions. Typically you
> would still use a password/passphrase to use your private key. Of
> course the same rules apply as to any password, use a good non-trivial
> one that can not be guessed.

You should use a passphrase to use with your private key, unless you're
using SSH between servers on the same subnet (preferably without third-party
network components) and the boxes use the same passwords.

Kind regards,

Jeroen van Meeuwen

--
kanarip

--
fedora-list mailing list
fedora-list@xxxxxxxxxx
To unsubscribe: https://www.redhat.com/mailman/listinfo/fedora-list