[EMAIL PROTECTED] writes:
[...]
> Possible loopholes that come to mind are:
>
> - User's ~/.ssh/ contents exported via NFS
> - Snooping passphrases via X11
> - yppasswd data or pop/imap passwords easily sniffed to circumvent ssh
Good points.
> It is not clear to me whether you are advocating RhostsRSAAuthentication,
> RSAAuthentication using no passphrase, something else, or it doesn't
> matter.
Hmm. I guess I'm not strongly advocating anything here. Assuming
that your two endpoints are secure (a big assumption), I'm not sure
how you could be compromised assuming your ~/.shosts file was set up
correctly.
To be honest, I hardly ever use this option.
--kevin
--
Kevin D. Clark ([EMAIL PROTECTED]) |
Cetacean Networks, Inc. | Give me a decent UNIX
Portsmouth, N.H. (USA) | and I can move the world
[EMAIL PROTECTED] (PGP Key Available) |
**********************************************************
To unsubscribe from this list, send mail to
[EMAIL PROTECTED] with the following text in the
*body* (*not* the subject line) of the letter:
unsubscribe gnhlug
**********************************************************