ssh attack

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]



> Right now I use passwords for some ssh connections, and passwordless ssh 
> for crontab rsyncs, using passwordless rsa keys. (When it asked to enter 
> a password for ssh-keygen I just hit enter). Does this leave me 
> vulnerable? Is there a how-to on this that explains how to use ssh-agent 
> with keys with passes?

I recommend Keychain <http://www.gentoo.org/proj/en/keychain/>.  With
keychain, you can log in and unlock your keys and allow your ssh
communications to use them as needed.  You do have to unlock them after
each reboot.

Barry


[Index of Archives]     [CentOS]     [CentOS Announce]     [CentOS Development]     [CentOS ARM Devel]     [CentOS Docs]     [CentOS Virtualization]     [Carrier Grade Linux]     [Linux Media]     [Asterisk]     [DCCP]     [Netdev]     [Xorg]     [Linux USB]
  Powered by Linux