Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 16 Jan 2001 10:06:43 -0800
From:      Jonas Luster <loki@smurftarget.net>
To:        freebsd-security@freebsd.org
Subject:   Re: A wish and a dream...
Message-ID:  <20010116100642.A59220@netwarriors.org>
In-Reply-To: <3A642174.9A7A8068@tempest.sk>; from pavol_adamec@tempest.sk on Tue, Jan 16, 2001 at 11:24:52AM %2B0100
References:  <3A641F3F.55AA9322@sarenet.es> <3A642174.9A7A8068@tempest.sk>

next in thread | previous in thread | raw e-mail | index | archive | help
[ Reformatted for readers sanity ]

* Pavol Adamec sez:

> >         I know the subject suggests an SPAM, but it isn't.
> > 
> >         It would be great to have a small gadget (for example, with
> > an USB interface) with the ssh private key stored, so that ssh used it
> > to authenticate instead of having to store the key in the disk.

> Rainbow Technologies - iKey

If I understand the webpage correctly, then this is not a storage medium
for random keys and such... but myabe I'm missing this fetaure.

For my BSD-machines I've bought a Compact Flash 16MB card and some
CFreaders for the desktops and stored my PGP and SSH stuff on them. A
small script mounts and unmounts the CF-card (which announces itself to
the OS as a new file system) under .keys, and .ssh, .pgp and .gpg have
the needed symlinks.

This seems so far the most cost-effective and portable solution.

jonas

-- 
http://www.advogato.org/person/jLoki


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20010116100642.A59220>