Jesse Schultz on Wed, 3 Jul 2002 08:59:33 -0400 |
gabriel rosenkoetter wrote: On Tue, Jul 02, 2002 at 10:39:38PM -0400, Jesse Schultz wrote:
Absolutly, a good PKI is far superior and makes mitm less likely (not impossible, but very difficult/unlikely). I also like the idea of different certificates. This is very much like Single Sign On systems I have worked with where everyone has there own certificate which grants them various levels of access. I am actually looking to implement a certificate based system for SSH POP3 and possibly a VPN system. All would use the same certificate. Only myself and the owner of the company (An RF engineer so pretty technical) would have root access. Since we all know each other pretty well I am thinking of being our own little CA. So I'm doing a little research here and what you are saying sounds interesting. I choose to leave the xterm in which I've connected as root up and not do much with it except when I need to because I've got a lot of (virtual) screen real estate. What you might choose to do is just ssh root@localhost (presuming you're allowing agent forwarding to the host in question) when you need root access. Doing so is definitely more safe than using su(1). (Note that if, at any point, you enter a shared secret over the wire, you've screwed up. Make sure you understand how SSH agent forwarding works, and why you shouldn't just use it blindly with every host out there.)
______________________________________________________________________ Philadelphia Linux Users Group - http://www.phillylinux.org Announcements-http://lists.phillylinux.org/mail/listinfo/plug-announce General Discussion - http://lists.phillylinux.org/mail/listinfo/plug
|
|