On Thursday 17 April 2008, Brian Mathis wrote:
> On Tue, Apr 15, 2008 at 8:12 AM, Peter Kjellstrom <[EMAIL PROTECTED]> wrote:
> > On Tuesday 15 April 2008, Clint Dilks wrote:
> > > 1. Currently all of the key pairs we are using have empty passphrases
> > > is it worth the effort of changing this
On Tue, Apr 15, 2008 at 11:48 AM, Fajar Priyanto <[EMAIL PROTECTED]> wrote:
> On Tuesday 15 April 2008 16:13:55 William L. Maltby wrote:
> > How sensitive is the data and how critical are the functions that that
> > could be disrupted? What is the scope of exposure to intrusion from
> > outside
On Wed, Apr 16, 2008 at 8:15 PM, Brian Mathis <[EMAIL PROTECTED]> wrote:
>
> On Tue, Apr 15, 2008 at 8:12 AM, Peter Kjellstrom <[EMAIL PROTECTED]> wrote:
> > On Tuesday 15 April 2008, Clint Dilks wrote:
> > > 1. Currently all of the key pairs we are using have empty passphrases is
> > > it wor
On Tue, Apr 15, 2008 at 8:12 AM, Peter Kjellstrom <[EMAIL PROTECTED]> wrote:
> On Tuesday 15 April 2008, Clint Dilks wrote:
> > 1. Currently all of the key pairs we are using have empty passphrases is
> > it worth the effort of changing this and setting up ssh-agent compared
> > to what you gain
Clint Dilks wrote:
Hi People,
The Linux Environment I am responsible for is using ssh key pairs to
allow access to a number or accounts on a number Linux Servers. I
currently have the opportunity to re-design some of this. So I would
like to tap into peoples experiences to see what might be
Fajar Priyanto wrote:
On Tuesday 15 April 2008 16:13:55 William L. Maltby wrote:
How sensitive is the data and how critical are the functions that that
could be disrupted? What is the scope of exposure to intrusion from
outside the organization (LAN, firewalls, in place, etc.).
For example rsy
On Tuesday 15 April 2008, Clint Dilks wrote:
> 1. Currently all of the key pairs we are using have empty passphrases is
> it worth the effort of changing this and setting up ssh-agent compared
> to what you gain in security by doing this ?
To get a clear idea of what keys with no passphrases are l
On Tuesday 15 April 2008, Fajar Priyanto wrote:
> On Tuesday 15 April 2008 16:13:55 William L. Maltby wrote:
> > How sensitive is the data and how critical are the functions that that
> > could be disrupted? What is the scope of exposure to intrusion from
> > outside the organization (LAN, firewall
On Tuesday 15 April 2008 16:13:55 William L. Maltby wrote:
> How sensitive is the data and how critical are the functions that that
> could be disrupted? What is the scope of exposure to intrusion from
> outside the organization (LAN, firewalls, in place, etc.).
For example rsync functions.
It won
On Tue, 2008-04-15 at 17:56 +1200, Clint Dilks wrote:
> Hi People,
>
> The Linux Environment I am responsible for is using ssh key pairs to
> allow access to a number or accounts on a number Linux Servers. I
> currently have the opportunity to re-design some of this. So I would
> like to tap
On Tue, Apr 15, 2008 at 7:56 AM, Clint Dilks <[EMAIL PROTECTED]> wrote:
> 1. Currently all of the key pairs we are using have empty passphrases is it
> worth the effort of changing this and setting up ssh-agent compared to what
> you gain in security by doing this ?
Sure. In the first case someon
Clint Dilks wrote:
1. Currently all of the key pairs we are using have empty passphrases is
it worth the effort of changing this and setting up ssh-agent compared
to what you gain in security by doing this ?
Certainly, adding passphrases nudges the security up a step, as
otherwise a compromis
Hi People,
The Linux Environment I am responsible for is using ssh key pairs to
allow access to a number or accounts on a number Linux Servers. I
currently have the opportunity to re-design some of this. So I would
like to tap into peoples experiences to see what might be some good
changes
On Wed, Dec 05, 2007, Evans F. Mitchell KD4EFM / AFA2TH / WQFK-894 wrote:
>On my logwatch that I have emailed to me,
>I see a line where I'm showed logging in via a known
>ip address, and when I log in from my laptop through
>my EV-DO card wirelessly, the computer show log in as
>ok, but it can not
On my logwatch that I have emailed to me,
I see a line where I'm showed logging in via a known
ip address, and when I log in from my laptop through
my EV-DO card wirelessly, the computer show log in as
ok, but it can not translate the ip from the aircard
and marks the log in as a possible hack atte
15 matches
Mail list logo