On Tue, Apr 14, 2009 at 04:59:28PM +1000, Olivier Mehani wrote:
> I'm wondering, however, if there were any security risks introduced by
> specifically using the host key instead of one generated specifically
> for that purpose and, if so, what they were.

Personally I like using user keys instead. They are easy to generate.
You can have more than one such key per machine and tie each key to a
forced command on the server. You can run processes as normal users
instead of root. The list goes on. The only drawback is spending a few
seconds generating keys.

-- 
Darrin Chandler            |  Phoenix BSD User Group  |  MetaBUG
[email protected]   |  http://phxbug.org/      |  http://metabug.org/
http://www.stilyagin.com/  |  Daemons in the Desert   |  Global BUG Federation

Reply via email to