• caglararli@hotmail.com
  • 05386281520

Security on home system – ssh keys etc

Çağlar Arlı      -    25 Views

Security on home system – ssh keys etc

I use two computers every day, my home server which is a desktop system and my laptop. Both systems run xubuntu and, being mostly a command line user, I use ssh to connect between the systems, to connect to various headless Raspberry Pis and Beaglebone Blacks and to connect to remote servers.

At present I have a slight preference for using password authentication as opposed to public-key for the following reason:-

My laptop and desktop machines both stay turned on nearly all the time. The desktop is always on because it's a mail server (and the DNS for my LAN), the laptop stays on simply because it's convenient. My key files are encrypted (i.e. they have a passphrase) but are automatically decrypted and put into ssh-agent when I log in. Thus any login that uses my default key is passwordless and passphraseless at the time of use. So, anyone walking up to my turned on system can log in to any remote ssh server where I have set up public-key authentication. If I use password authentication the remote server will need a password for login.

Thus for me in my default situation it feels as if password authentication is more secure, not in the sense of the password itself being 'stronger' than a public-key but in the sense that it makes my overall use of remote systems more secure.

Have I missed anything obvious here or does the above analysis make reasonable sense?