Hacked: SSH Based Security.

Sat 17 December 2005

Filed under Sec.

Tags Retarded

Security, or the process of attempting to protect computers is an imprecise science at best. How do you secure SSH?

  • Keybased Authentication

    • Strength: Difficult to break
    • Weakness: Carrying Keys Around
  • Kerberos

    • Strength: Less passwords
    • Strength: Can be used instead of passwords for many services.
    • Weakness: You can catch auth-sessions, then run cracking against the token.
    • Weakness: Still based on password strength

  • Passwords:

    • D'uh

So, we are left at a small impasse.

Requirements:

  • Ubituitous Remote Access


Comments


Up To Something © Joshua M Schmidlkofer Powered by Pelican and Twitter Bootstrap. Icons by Font Awesome and Font Awesome More