-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

The key does not have to stay on the laptop.  You can save it in an
encrypted partition on the hard drive or usb key, then connect via -i
path-to-key

Shawn wrote:
> On Tuesday 01 November 2005 15:55, Gustin Johnson wrote:
> 
>>SSH keys can also make this sort of attack meaningless, though they do
>>introduce their own security implications.
> 
> 
> That describes my issue.  I don't mind setting up ssh keys for the internal 
> network, but I need to be mobile with my laptop, and do not want just anybody 
> who happens to "borrow" the laptop to be able to access the network.  It 
> could be a few hours or more before I can return to the network and remove 
> that key...
> 
> So, I end up leaving password attempts enabled for SSH, but make sure I have 
> a 
> strong password - a necessary evil I think...
> 
> Shawn
> 
> 
> ------------------------------------------------------------------------
> 
> _______________________________________________
> clug-talk mailing list
> [email protected]
> http://clug.ca/mailman/listinfo/clug-talk_clug.ca
> Mailing List Guidelines (http://clug.ca/ml_guidelines.php)
> **Please remove these lines when replying
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (GNU/Linux)
Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org

iD8DBQFDaWgkwRXgH3rKGfMRAoKtAKCEJr8txj96m7EkvmoI+GNQL7MYfQCdHGXN
7B+tawuQTaFygXGT9bwjEqk=
=oaGl
-----END PGP SIGNATURE-----

_______________________________________________
clug-talk mailing list
[email protected]
http://clug.ca/mailman/listinfo/clug-talk_clug.ca
Mailing List Guidelines (http://clug.ca/ml_guidelines.php)
**Please remove these lines when replying

Reply via email to