Break-In Attempt -- Now What?
Taavi Burns
jaaaarel-Re5JQEeQqe8AvxtiuMwx3w at public.gmane.org
Tue Nov 30 22:11:09 UTC 2004
On 30 Nov 2004 15:59:40 -0500, Tim Writer <tim-s/rLXaiAEBtBDgjK7y7TUQ at public.gmane.org> wrote:
> Alex Beamish <talexb-Re5JQEeQqe8AvxtiuMwx3w at public.gmane.org> writes:
> Even better is to disable password based logins, allowing only key based
> logins. This secures you against dictionary based attacks. Barring flaws in
> ssh itself, an attacker would need your private ssh key and associated pass
> phrase to get into your computer via ssh.
Just the private ssh key, afaik. Now, to GET the private ssh key, an attacker
would need to get access to your key file (which would be located on a USB
memory stick or laptop or wherever you're logging in FROM) AND your
associated passphrase in order to decrypt the key file (key file + passphrase
= private key).
At least that's my understanding. :)
--
taa
/*eof*/
--
The Toronto Linux Users Group. Meetings: http://tlug.ss.org
TLUG requests: Linux topics, No HTML, wrap text below 80 columns
How to UNSUBSCRIBE: http://tlug.ss.org/subscribe.shtml
More information about the Legacy
mailing list