--- On Fri, 6/6/08, Bond Masuda <[EMAIL PROTECTED]> wrote:
> From: Bond Masuda <[EMAIL PROTECTED]>
> Subject: Re: Allowing remote root login seems to be bad. Why? (SUMMARY)
> To: [email protected]
> Date: Friday, June 6, 2008, 4:17 AM
> Hari Sekhon wrote:
> > I am a little surprised people have not been talking
> about ssh-key-only
> > logins (but then I didn't bother mentioning it
> until now either... ;-) )
>
> In my experience, using public key authentication is often
> more of a
> security risk, depending on the situation. If the remote
> machine that
> holds the private key (and some store this with no password
> for
> convenience) is compromised, they immediately have an open
> door into
> your server. You may have no control how passwords are
> enforced, updates
> are applied, or if any security is implemented on the
> remote end.
> Setting up public key authentication, in effect extends
> your "trust
> domain" to a server that may not be so trust worthy.
> To me, it makes
> more sense to rely on security I can control. (which is
> often not the
> case if it is some other user's office desktop or
> workstation)
>
> -Bond
There are some good reasons to force key authentication. You can set up some
good rules in the authorized_keys file, and on a user-to-user basis. Some
examples:
from="pattern-list"
no-agent-forwarding
no-port-forwarding
no-pty
no-X11-forwarding
permitopen="host:port"