20. Why do we need to use SSH keys, they make life difficult!

Yes, unfortunately the use of SSH keys (with passphrases) can be confusing. SSH is far more complex than Telnet --- there at least 4 authentication methods, some of which involve keys, and there are different types of keys too.

(To access bohrg1 and bohrg3, follow these notes, the section on Key/Passphrase Authentication in particular. N.B. Use DSA keys to access these machines, nor RSA keys.)

At the time of writing (2005/April/05) accounts on HPC machines connected to the Internet are increasingly being compromised, globally. Frequently this is done by first compromising the desktop machine from which a user logs in to the HPC machine; key-grabbing software is often installed on such compromised desktops. The use of keys with passphrases means that an HPC account cannot be compromised by this method.

...previousup (conts)next...



About this document:

Produced from the SGML: /home/mc/public_html/_bohrg/_reml_grp/bohrg_dominion_user_doc.reml
On: 12/12/2005 at 13:37:58
Options: reml2 -i noindex -l long -o html -p multiple