Re: Palm to FreeBSD using ssh
From: Timothy Luoma (lists_at_tntluoma.com)
Date: Mon, 29 Aug 2005 13:39:11 -0400 To: Mark Senior <Mark.Senior@gov.ab.ca>
On Aug 29, 2005, at 11:49 AM, Mark Senior wrote:
> The correct answer is probably "it depends". There are a couple of
> factors that spring to mind. I've probably left some things out, but
> maybe this would give you a place to start.
> - malicious servers - how frequently will you connect to unknown ssh
> servers? The more often you do this, the more you should tend to use
> the more thoroughly tested software (but as you say, maybe the
> makers of
> tussh just less humble).
Almost never. I connect to the same 2 servers all the time, a 3rd
one less often. Other than that, I just don't.
> - client theft - how likely is the device that stores your private
> to be stolen (or lost)? The more likely this is, the more you should
> tend to use encrypted keys. In the case of a portable device, I would
> weigh theft as by far the highest risk.
The key is a "DSA Private Key" which I assumed was safe.
> - client compromise - how likely is the device that stores you
> private keys to be compromised? A Windows worm can compromise a
> Unix box, if the Windows box stores unencrypted ssh keys for the
> Unix box. Encrypting keys provide some defence in depth against this.
The client machine in question is a Mac. I don't store anything of
value on a Windows machine.