BLU Discuss list archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Discuss] ssh keys question
- Subject: [Discuss] ssh keys question
- From: bill at horne.net (Bill Horne)
- Date: Fri, 17 Jun 2016 21:05:21 -0400
- In-reply-to: <5764883F.3030807@borg.org>
- References: <mailman.11.1466179204.26887.discuss@blu.org> <ee255849986a8455a436c0cff185444c.squirrel@webmail.ci.net> <5764883F.3030807@borg.org>
On 6/17/2016 7:31 PM, Kent Borg wrote: > On 06/17/2016 02:20 PM, Rich Braun wrote: >> You should also encrypt your private key with a passphrase, using >> 'ssh-keygen >> -p'. The ssh-agent allows you to use it repeatedly for the duration of a >> session without having to retype the password multiple times. > > If you think anyone motivated might ever get a hold of your encrypted > file, use a *really* good passphrase. Something in excess of 100-bits > of entropy in it. Out of curiosity, please tell me how entropy is measured, and how many bits of entropy are in the string "ysywlmtihtg". TIA. Bill Horne -- Bill Horne 828-678-1548
- Follow-Ups:
- [Discuss] ssh keys question
- From: kentborg at borg.org (Kent Borg)
- [Discuss] ssh keys question
- References:
- [Discuss] ssh keys question
- From: richb at pioneer.ci.net (Rich Braun)
- [Discuss] ssh keys question
- From: kentborg at borg.org (Kent Borg)
- [Discuss] ssh keys question
- Prev by Date: [Discuss] SSH port forwarding through middleman (bastion host)
- Next by Date: [Discuss] ssh keys question
- Previous by thread: [Discuss] ssh keys question
- Next by thread: [Discuss] ssh keys question
- Index(es):