Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 15 Sep 2014 12:13:11 -0700
From:      Charles Swiger <cswiger@mac.com>
To:        John Case <case@SDF.ORG>
Cc:        FreeBSD - <freebsd-questions@freebsd.org>
Subject:   Re: comparing SSH key and passphrase auth vs. an SSH key *with* a passphrase ...
Message-ID:  <C95AD5C3-85F5-406E-9FAF-88688C63A4F2@mac.com>
In-Reply-To: <Pine.NEB.4.64.1409151906110.5595@faeroes.freeshell.org>
References:  <Pine.NEB.4.64.1409112200270.27915@faeroes.freeshell.org> <08D7B04D-CBBF-4330-BAD6-2668F9560964@mac.com> <Pine.NEB.4.64.1409151906110.5595@faeroes.freeshell.org>

next in thread | previous in thread | raw e-mail | index | archive | help
On Sep 15, 2014, at 12:07 PM, John Case <case@SDF.ORG> wrote:
> On Thu, 11 Sep 2014, Charles Swiger wrote:
>> If you want to improve security, however, either 2-factor auth or OPIE / one-time passwords would be better than SSH key+passphrase.
> 
> 
> Ok, thanks - but SSH key+passphrase is still much better than just plain old password, yes ?

Yes, it's better.  However, the default storage that SSH uses for private keys with a passphrase isn't as strong as it could be.

Regards,
-- 
-Chuck




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?C95AD5C3-85F5-406E-9FAF-88688C63A4F2>