Re: Stupid question about SSH keys and security

2002-10-14 Thread Todd A. Jacobs
On 13 Oct 2002, Peter Kiem wrote: > I have rsa2 SSH logins running now. I can see this is a great idea as > even if the attacker KNOWS your root password they STILL cannot get in > without your private rsa key, right? That's sort of correct. Root can, in fact, connect to an existing ssh-agent s

Re: Stupid question about SSH keys and security

2002-10-13 Thread Peter Kiem
Hi all, I have rsa2 SSH logins running now. I can see this is a great idea as even if the attacker KNOWS your root password they STILL cannot get in without your private rsa key, right? Is there some way to make it easier to run ssh-agent? I was trying to put the eval `ssh-agent'; ssh-add into

Re: Stupid question about SSH keys and security

2002-10-13 Thread Thornton Prime
> wrong ! With the public key and the root password known, > and files appropriately configured, the "attacker" won't > be prompted for a password. > > If the root password is known in any senario then "is all over" ! Can you clarify what you mean here? If you force key

Re: Stupid question about SSH keys and security

2002-10-13 Thread Thornton Prime
> If you have it set up like A -> B where A is your workstation and B is > your server so that A has your private key and B has your public key > what happens if you now want to log into another remote server C (A -> B > -> C)? Use agent forwarding. It will forward your key authentication-challe

Re: Stupid question about SSH keys and security

2002-10-13 Thread K Hargraves
On 13 Oct 2002, Peter Kiem wrote: > Hi all, > > I have rsa2 SSH logins running now. I can see this is a great idea as > even if the attacker KNOWS your root password they STILL cannot get in > without your private rsa key, right? wrong ! With the public key and the root password known

Re: Stupid question about SSH keys and security

2002-10-10 Thread Peter Kiem
> > Again, only if you create keys that have no passphrase. > > If you are using keys, you only need to fully trust your local SSH client. A > remote server can't compromise your public key or your passphrase, even if > you are using the compromised server to log into other servers (and are u

Re: Stupid question about SSH keys and security

2002-10-10 Thread Redhat Simon
The keys should also have a password incase of such problems and it is offered when you type ssh-keygen -t rsa. this is so much more secure as only a host with a recognised public key can even attempt to login. If you only allow rsa authentication, brute force attacks are no longer an option th

Re: Stupid question about SSH keys and security

2002-10-10 Thread Thornton Prime
> > At least if you are using passwords they need to work out the other > > computer's passwords before they can SSH into them? > > Again, only if you create keys that have no passphrase. Also, if you are using a password to log into a server that's been compromised, they don't need to work out

Re: Stupid question about SSH keys and security

2002-10-10 Thread Jason Costomiris
On 10/10/02 9:31 PM, "Peter Kiem" <[EMAIL PROTECTED]> wrote: > Hi, > > This might seem a stupid question but I often see people recommending that > you never log into SSH with password but rather use keys. > > Doesn't this create a security issue as if someone manages to break into one > comput

RE: Stupid question about SSH keys and security

2002-10-10 Thread Cameron . Davidson
you still need a passphrase to unlock the key. (99% of the time). So even if somebody steals your private key file they still need your passphrase to use it. It is possible to set one up with a null passphrase, but, not surprisingly, that is not recommended. If someone has stolen your private key