From owner-freebsd-questions@FreeBSD.ORG Fri Jan 8 13:47:16 2010 Return-Path: Delivered-To: freebsd-questions@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id EE39E1065672 for ; Fri, 8 Jan 2010 13:47:16 +0000 (UTC) (envelope-from carmel_ny@hotmail.com) Received: from blu0-omc4-s37.blu0.hotmail.com (blu0-omc4-s37.blu0.hotmail.com [65.55.111.176]) by mx1.freebsd.org (Postfix) with ESMTP id B03538FC15 for ; Fri, 8 Jan 2010 13:47:16 +0000 (UTC) Received: from BLU0-SMTP91 ([65.55.111.135]) by blu0-omc4-s37.blu0.hotmail.com with Microsoft SMTPSVC(6.0.3790.3959); Fri, 8 Jan 2010 05:47:16 -0800 X-Originating-IP: [67.189.160.65] X-Originating-Email: [carmel_ny@hotmail.com] Message-ID: Received: from [192.168.1.102] ([67.189.160.65]) by BLU0-SMTP91.blu0.hotmail.com over TLS secured channel with Microsoft SMTPSVC(6.0.3790.3959); Fri, 8 Jan 2010 05:47:15 -0800 Date: Fri, 08 Jan 2010 08:47:15 -0500 From: Carmel To: User questions Organization: seibercom.net In-Reply-To: <4B472DA9.6070701@nullroutes.com> References: <4B472DA9.6070701@nullroutes.com> X-Face: %w26Xx*^+moP{$gQJ3pY@y!8g&-n%/zKp; aE#\*zy9L1X$QU7)|K"# QM:ob~"(eWt{P?#Ec; |v]#G"{{WZF-rt\4n1IS3I[w>Z MIME-Version: 1.0 Content-Type: text/plain; charset="US-ASCII" Content-Transfer-Encoding: 7bit X-Mailer: Becky! ver. 2.52.03 [en] X-OriginalArrivalTime: 08 Jan 2010 13:47:15.0743 (UTC) FILETIME=[168792F0:01CA9069] Subject: Re: Accessing Computer X-BeenThere: freebsd-questions@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list Reply-To: User questions List-Id: User questions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 08 Jan 2010 13:47:17 -0000 On Fri, 08 Jan 2010 13:05:45 +0000 Daniel Grant articulated: > I would suggest protecting your keys with a passphrase, then the key > alone is not enough to gain access to the machines. > > Simply put - in order for someone to access computer 3 from computer 2, > would be for computer 3 to have computer 2's public key. So if computer > 2's private key can be accessed from computer 1, then yes access to > computer 3 could be granted. That is what I have considered doing. The problem is that I will have to remember the password. I tend to use different passwords for different things. I therefore have a bad habit of forgetting the password. In any case, I will probably be forced to go that route thought. -- Carmel carmel_ny@hotmail.com