e5b0d077 |
1 | \C{pubkey} Using public keys for SSH authentication |
2 | |
3 | \# Explain the basic principles of public key authentication. Many |
4 | \# people don't have the faintest idea what it is or why it's good. |
5 | |
6 | \# Explain the dangers of leaving an unprotected private key around. |
7 | \# Explain passphrases, and urge that people NEVER store |
8 | \# unpassphrased keys unless they really need to or they can be sure |
9 | \# the machine is secure. |
10 | |
11 | \# Mention a good length for a passphrase. (I think Schneier |
12 | \# said something about this on counterpane.com once.) |
13 | |
14 | \# In case people don't like the idea of exchanging a short password |
15 | \# typed every time for a longer passphrase typed every time, link |
16 | \# to the Pageant chapter. |