1 |
On Tue, Dec 02, 2003 at 05:46:58PM +0000, Hallgrimur H. Gunnarsson wrote: |
2 |
> |
3 |
> But it is true, sometimes security brings inconvenience. But I think |
4 |
> the idea of "ssh to home and then to gentoo" as a remedy for accessing |
5 |
> gentoo from an untrusted place is really bad. You've just given the |
6 |
> attacker your home computer in addition to gentoo. |
7 |
> |
8 |
|
9 |
I mentioned S/key authentication the last time this was discussed, and |
10 |
in this scenario it would be useful "ssh to home machine using s/key |
11 |
where you ssh key is, use public key auth to gentoo..". |
12 |
|
13 |
I think everyone should be using it :) |
14 |
|
15 |
I started a short thread about it on the forums. |
16 |
|
17 |
http://forums.gentoo.org/viewtopic.php?t=103232 |
18 |
-- |
19 |
------------------------------------- |
20 |
taviso@××××××××××××.org | finger me for my gpg key. |
21 |
------------------------------------------------------- |
22 |
|
23 |
-- |
24 |
gentoo-dev@g.o mailing list |