1 |
On 11/10/2015 11:26 AM, Michael Orlitzky wrote: |
2 |
> On 11/10/2015 11:13 AM, J. Roeleveld wrote: |
3 |
>> |
4 |
>> What would take longer? |
5 |
>> brute-forcing your root-password or a 4096 byte ssh key? |
6 |
>> |
7 |
> |
8 |
> My password, by a lot. The password needs to be brute-forced over the |
9 |
> network, first of all. |
10 |
|
11 |
I realized this wasn't correct while I was in the shower =P |
12 |
|
13 |
To tell if you decrypted the key properly, you need to send it over the |
14 |
network, so verification of a brute-force attempt on the SSH key takes |
15 |
about the same amount of time as a brute-force attempt on the root |
16 |
password. The root password in my head is safe against crypto attacks |
17 |
though, so if we're just arguing for fun, it's probably still safer. |
18 |
|
19 |
Adding the key *in addition to* the root password still only gives you a |
20 |
constant factor improvement, and I'm not worried whether it takes the |
21 |
bad guys 4,359,811,353 or 8,719,622,706 years to log in. My time would |
22 |
be better spent taking karate lessons to prevent one of those other |
23 |
attacks I mentioned. |