> Well, if you are truly concerned about security, then you should use
> different passwords for different machines/networks.
Not easy when you have access to over a dozen systems.
> If you connect into(from) a secure environment from(into) an insecure one,
> then you are at equal risk for compromising both your password and your
> passphrase. SSH should always be started from the local host (or at least
> on the same trusted network), otherwise it is no more secure than not
> using ssh at all, no matter how many passwords or passphrases one uses.
So my point exactly. Passphrases seemed totally useless since you can hack
(sniff) the normal password and still get in. Your point is valid where
changing the password on your secure systems would be better. For now,
from home I ssh into a linux server at work, and then telnet into the
local machines. Being on campus would make sniffing very difficult due
to the sheer volume of traffic.
> This is a problem, but you do not need to use .rhosts or .shosts.
> I do not use them.
Except when you have scripts that run remote commands.
Thanks... Dan.