On Thu, 11 May 2006, Laurent Rineau wrote:
On Thursday 11 May 2006 15:13, Jima wrote:
Why don't you just use the same keyfile on all of your hosts?
Because it is *bad*? :-)
Seriously, I avoid to compromise my keys by transporting them on the network
(even cyphered).
If you can't trust SSH (well, SCP) to transfer keyfiles securely, can you
trust it for *anything*?
The
filename doesn't *need* to be named id_dsa; you can configure ssh to use a
different file as per these instructions:
https://bugzilla.redhat.com/bugzilla/process_bug.cgi#c73
Incorrect link. :-(
Oops! :-P
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=188369#c73
Funny, I guess after you submit a comment, the resulting page has broken
links. Cute.
Anyway, I know the use of .ssh/config
If I cannot specify several SSH keys, I will create a special key for my CVS
account, that I will transport on all my unix accounts, as you suggest.
That's what I did, yeah. I'm not sure how much overhead would be
entailed in adding authorized_keys support.
Jima
--
fedora-extras-list mailing list
fedora-extras-list@xxxxxxxxxx
https://www.redhat.com/mailman/listinfo/fedora-extras-list