SSH Security

Wed Dec 7 14:35:52 UTC 2005

> Key based authentication is the right way to go.  You should disable
> root ssh access completely.  

Key based authentication is good, but there is one caveat.  Straight
key based allows you to log in directly without typing a password.
If you are ssh'ing from work to home from a UNIX machine, any sys-admin
with the root password on your work machine can become you and then
ssh to your home machine as you with no password.  Maybe you don't care
if your sysadmin is dinking around in your home machine and maybe you do.

I am not saying not to use key based authentication, but it is not a 
cure all.  

Bob Styma

More information about the fedora-list mailing list