-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 The key does not have to stay on the laptop. You can save it in an encrypted partition on the hard drive or usb key, then connect via -i path-to-key
Shawn wrote: > On Tuesday 01 November 2005 15:55, Gustin Johnson wrote: > >>SSH keys can also make this sort of attack meaningless, though they do >>introduce their own security implications. > > > That describes my issue. I don't mind setting up ssh keys for the internal > network, but I need to be mobile with my laptop, and do not want just anybody > who happens to "borrow" the laptop to be able to access the network. It > could be a few hours or more before I can return to the network and remove > that key... > > So, I end up leaving password attempts enabled for SSH, but make sure I have > a > strong password - a necessary evil I think... > > Shawn > > > ------------------------------------------------------------------------ > > _______________________________________________ > clug-talk mailing list > [email protected] > http://clug.ca/mailman/listinfo/clug-talk_clug.ca > Mailing List Guidelines (http://clug.ca/ml_guidelines.php) > **Please remove these lines when replying -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.1 (GNU/Linux) Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org iD8DBQFDaWgkwRXgH3rKGfMRAoKtAKCEJr8txj96m7EkvmoI+GNQL7MYfQCdHGXN 7B+tawuQTaFygXGT9bwjEqk= =oaGl -----END PGP SIGNATURE----- _______________________________________________ clug-talk mailing list [email protected] http://clug.ca/mailman/listinfo/clug-talk_clug.ca Mailing List Guidelines (http://clug.ca/ml_guidelines.php) **Please remove these lines when replying

