On Tue, Dec 02, 2003 at 05:46:58PM +0000, Hallgrimur H. Gunnarsson wrote:
> 
> But it is true, sometimes security brings inconvenience. But I think
> the idea of "ssh to home and then to gentoo" as a remedy for accessing
> gentoo from an untrusted place is really bad. You've just given the
> attacker your home computer in addition to gentoo.
> 

I mentioned S/key authentication the last time this was discussed, and
in this scenario it would be useful "ssh to home machine using s/key
where you ssh key is, use public key auth to gentoo..".

I think everyone should be using it :)

I started a short thread about it on the forums.

http://forums.gentoo.org/viewtopic.php?t=103232
-- 
-------------------------------------
[EMAIL PROTECTED] | finger me for my gpg key.
-------------------------------------------------------

--
[EMAIL PROTECTED] mailing list

Reply via email to