On Fri 09 Jan 2015 at 21:19:41 -0500, Jerry Stuckle wrote:

> On 1/9/2015 8:49 PM, Joel Rees wrote:
> 
> > SSH keys are useful, but you have to keep them somewhere. The real
> > danger to good passwords is the off-line attempts, and the passphrase
> > you use for your private keystore is potentially subject to off-line
> > if your password is.
> > 
> 
> Yes, keys may actually be less secure than passwords.

That's an an interesting line of enquiry! An administrator who enforces
a log in with keys knows exactly what the server will accept in terms of
authentication for *all* users. What he does not know is the level of
security which the user has placed on the key with the passphrase.
Furthermore, he has no technical way of ensuring the passphrase is
sufficiently strong or that the private key is not left lying about on
various machines to be probed at someone's leisure.

Another interesting aspect is that public-key authentication support by
ssh was not introduced as a response to any perceived general weakness
in a login with a password. SSH, The Secure Shell: The Definitive Guide
cites the single password per account as inconvenient (a new password
must be communicated to everyone with access to the account) and
accountabilty of access as reasons.

Granted, the same book also says passwords can be captured on a
compomised host. But if the host is compromised the administrator has
quite big problems elsewhere.

By all means advocate and use ssh keys. But at least provide some
substantial reason for spurning password login for that particular
situation. A blanket "don't use passwords" or "keys are better" doesn't
cut it.


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
https://lists.debian.org/10012015194257.e68f933ce...@desktop.copernicus.demon.co.uk

Reply via email to