Re: what percent of time are there unpatched exploits against default config?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]



On 12/30/2011 01:33 AM, m.roth@xxxxxxxxx wrote:
> Marko Vojinovic wrote:
>> On Thursday 29 December 2011 14:59:14 Reindl Harald wrote:
>>> Am 29.12.2011 14:21, schrieb Marko Vojinovic:
>>>>> so explain me why discuss to use or not to use the best
>>>>> currently availbale method in context of security?
>>>>
>>>> Using the ssh key can be problematic because it is too long and too
>>>> random to be memorized --- you have to carry it on a usb stick (or
>>>> whereever). This provides an additional point of failure should your
>>>> stick get lost or stolen. Human brain is still by far the most secure
>>>> information-storage device. :-)
>>> this is bullshit
>>> most people have their ssh-key on a usb-stick
>>
>> And how are you going to access your servers if the stick gets broken or
>> lost? I guess you would have to travel back to where the server is
>> hosted, in order to copy/recreate the key.
>
> Um, yep: you're SOL, same as if you spilled coffee on your laptop, or
> whatever. And if you loose it, you should then create a new one.
>>
>> I did not argue that the key is not more secure than a password. I was
>> just pointing out that sometimes it can be more inconvenient.
>
> All security is inconvenient. What's implemented is a balance between
> convenience and security - really secure is a system not connected to any
> network, and with no USB ports, that runs off a DVD....

...at the bottom of the ocean...
_______________________________________________
CentOS mailing list
CentOS@xxxxxxxxxx
http://lists.centos.org/mailman/listinfo/centos


[Index of Archives]     [CentOS]     [CentOS Announce]     [CentOS Development]     [CentOS ARM Devel]     [CentOS Docs]     [CentOS Virtualization]     [Carrier Grade Linux]     [Linux Media]     [Asterisk]     [DCCP]     [Netdev]     [Xorg]     [Linux USB]
  Powered by Linux