[EMAIL PROTECTED] writes:

[...]
> Possible loopholes that come to mind are:
> 
>       - User's ~/.ssh/ contents exported via NFS
>       - Snooping passphrases via X11
>       - yppasswd data or pop/imap passwords easily sniffed to circumvent ssh

Good points.

> It is not clear to me whether you are advocating RhostsRSAAuthentication,
> RSAAuthentication using no passphrase, something else, or it doesn't
> matter.

Hmm.  I guess I'm not strongly advocating anything here.  Assuming
that your two endpoints are secure (a big assumption), I'm not sure
how you could be compromised assuming your ~/.shosts file was set up
correctly.

To be honest, I hardly ever use this option.

--kevin
-- 
Kevin D. Clark ([EMAIL PROTECTED]) |
Cetacean Networks, Inc.                            |   Give me a decent UNIX
Portsmouth, N.H. (USA)                             |  and I can move the world
[EMAIL PROTECTED] (PGP Key Available)       |






**********************************************************
To unsubscribe from this list, send mail to
[EMAIL PROTECTED] with the following text in the
*body* (*not* the subject line) of the letter:
unsubscribe gnhlug
**********************************************************

Reply via email to