On December 26, 2002 08:27 am, the fabulous hugh at atosc dot org wrote:

> Using a ssh key without a passphrase seems to be be a bad idea.
> You need to look on keychain.

Depends on what you are doing but keychain definitely looks interesting 
(haven't given it a try yet).

Looking at the description of keychain I'd still go with a passphraseless key 
though.  I don't want automated scripts failing because a server has rebooted 
and I forgot to run keychain.

The passphraseless key would be severely restricted:

- login only allowed from known host
- key only used in purpose specific case (not for general login)
- key restricted in port forwards allowed
- possibly forcibly running a command on login, allow nothing else

I'm not sure how keychain reduces the risks.  A passphraseless key is mode 
400, root or user-level compromise is required for it to be used in an 
attack.  The same level of compromise would make your keychain setup just as 
vulnerable, right?

Fraser


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to