In message <>, Greg A. Woods writes:
> 
> This is a *VERY* critical issue for SSH users to understand.  You cannot
> safely walk up to your mortal enemy's computer (or any other un-trusted
> computer) and use it to open an SSH connection into your secure network
> no matter how careful you are to do all the actual authentication on a
> separate disconnected hardware device, or how unique your one-time
> password is.

Precisely.  All the off-board hardware you can think of protects private
keys; it does nothing to protect the actions taken under authority of
those keys.

Reply via email to