Date: Mon, 15 Sep 2014 12:13:11 -0700 From: Charles Swiger <cswiger@mac.com> To: John Case <case@SDF.ORG> Cc: FreeBSD - <freebsd-questions@freebsd.org> Subject: Re: comparing SSH key and passphrase auth vs. an SSH key *with* a passphrase ... Message-ID: <C95AD5C3-85F5-406E-9FAF-88688C63A4F2@mac.com> In-Reply-To: <Pine.NEB.4.64.1409151906110.5595@faeroes.freeshell.org> References: <Pine.NEB.4.64.1409112200270.27915@faeroes.freeshell.org> <08D7B04D-CBBF-4330-BAD6-2668F9560964@mac.com> <Pine.NEB.4.64.1409151906110.5595@faeroes.freeshell.org>
next in thread | previous in thread | raw e-mail | index | archive | help
On Sep 15, 2014, at 12:07 PM, John Case <case@SDF.ORG> wrote: > On Thu, 11 Sep 2014, Charles Swiger wrote: >> If you want to improve security, however, either 2-factor auth or OPIE / one-time passwords would be better than SSH key+passphrase. > > > Ok, thanks - but SSH key+passphrase is still much better than just plain old password, yes ? Yes, it's better. However, the default storage that SSH uses for private keys with a passphrase isn't as strong as it could be. Regards, -- -Chuck
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?C95AD5C3-85F5-406E-9FAF-88688C63A4F2>