Gabriel Sechan wrote:
From: "Lan Barnes" <[EMAIL PROTECTED]>
On Fri, December 1, 2006 1:32 pm, Gabriel Sechan wrote:
Not allowed by the security team, or I would.

This doesn't reflect well on the security team IMHO. I have seen environments where ssh keys were not welcome also and it always came from a lack of understanding how the keys work.

for just getting it done than to get reprimanded. Besides, I think the real issue the security team had was that noone was typing passwords to do it. We still use ssh daily, just not passwordless or key based ssh.

The right way to use ssh-keys is with ssh-agent. With ssh-agent you have to enter the password once to decrypt you key which is held in memory and only child processes of ssh-agent have access to it. More secure than an potentially guessable normal passworded login. You can even set up ssh-agent to which you have authenticated which can then use your keys to copy the files around or take whatever actions you need using your authority.

But I'm sure an expect script can do the job also. Just a shame not to be able to use the best tool for the job due to politics. :)

--
Tracy R Reed                  http://ultraviolet.org
A: Because we read from top to bottom, left to right
Q: Why should I start my reply below the quoted text

--
[email protected]
http://www.kernel-panic.org/cgi-bin/mailman/listinfo/kplug-lpsg

Reply via email to