Boston Linux & UNIX was originally founded in 1994 as part of The Boston Computer Society. We meet on the third Wednesday of each month at the Massachusetts Institute of Technology, in Building E51.

BLU Discuss list archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Discuss] deadmanish login?

Hi Kent,

On Fri, Feb 03, 2017 at 01:20:11PM -0500, Kent Borg wrote:

> You are a proponent of ssh keys, right? And you encrypt yours, right? And
> you use a passphrase...that has how much entropy? I bet less than 100-bits
> of entropy, because typing good passphrases is really hard. I further bet
> that your key sits unencrypted much of the time because you are too lazy to
> type even your poor passphrase every time you would have to. Good passphrase
> hygiene is hard, much harder than good password hygiene.
> Compared to a decent password (that isn't shared between systems*) ssh keys
> solve a problem that doesn't exist, yet they create additional problems that
> you ignore.

You can keep your ssh keys on a PIN protected smartcard and only insert
it when you need to log in somewhere. Your keys never leave the
card. When the card is unplugged, an attacker has no access at all. I
feel like this is better than a password.  It also makes it easier to
keep the keys synchronized between boxes.

gpg-agent can allow access to GPG keys on a card with the
--enable-ssh-support option.


    Enable the OpenSSH Agent protocol.

    In this mode of operation, the agent does not only implement the
    gpg-agent protocol, but also the agent protocol used by OpenSSH
    (through a separate socket). Consequently, it should be possible to
    use the gpg-agent as a drop-in replacement for the well known


BLU is a member of BostonUserGroups
BLU is a member of BostonUserGroups
We also thank MIT for the use of their facilities.

Valid HTML 4.01! Valid CSS!

Boston Linux & Unix /