On Tue, Apr 14, 2009 at 04:59:28PM +1000, Olivier Mehani wrote: > I'm wondering, however, if there were any security risks introduced by > specifically using the host key instead of one generated specifically > for that purpose and, if so, what they were.
Personally I like using user keys instead. They are easy to generate. You can have more than one such key per machine and tie each key to a forced command on the server. You can run processes as normal users instead of root. The list goes on. The only drawback is spending a few seconds generating keys. -- Darrin Chandler | Phoenix BSD User Group | MetaBUG [email protected] | http://phxbug.org/ | http://metabug.org/ http://www.stilyagin.com/ | Daemons in the Desert | Global BUG Federation

