On Sat, 2002-08-31 at 20:03, Steve Loughran wrote:
> If you have the private keys on a system you've put a chink in the security,
> and if you have that system running build files from SCM, then you have to
> stop the SCM from being compromised too. But that latter problem exists with
> all server side projects, to a greater or lesser extent.

Not true.  Ssh allows us to define per-key restrictions.  I can set it
up so that a certain key can only be used to execute one particular
command and only when it is used from one particular ip address.  That
is quite safe.  It is a good protocol from this perspective.


--
To unsubscribe, e-mail:   <mailto:[EMAIL PROTECTED]>
For additional commands, e-mail: <mailto:[EMAIL PROTECTED]>

Reply via email to