On 2008-05-18, Mark Shroyer <[EMAIL PROTECTED]> wrote:
> I've set up a nice secondary authentication mechanism on a Linux server.
> I use this when I must shell in from, e.g., a computer lab, and I don't
> have an authorized SSH private key on my workstation.  To login without
> a private key, I must:
>
>  1) Enter my account's current S/Key one-time password
>
> and
>
>  2) Enter my Unix password
>
> in sequence.

In what way does typing your password in to an untrusted machine
improve security?

Reply via email to