On Sat, Feb 01, 2003 at 12:57:08PM -0800, nate wrote: > will trillich said: > > > at what point are the passphrases required? if passwordless > > login/scp is the objective, where are the passphrases used? > > ssh-agent is designed to prompt you for your passphrase, then > it stores it in memory, and automatically 'inputs' it when you > connect. That is until you logout or reboot or something. I > have never used ssh-agent myself. for my personal account I > use SSH w/passphrase and just input it every time. I use > passphrase-less keys for mostly non interactive stuff.
afaik ssh-agent stores the key in memory, not the passphrase (you never give ssh-agent the passphrase, that's from ssh-add). ssh-agent outputs some environment variables that can be inherited by child processes, and then you load in your key with ssh-add or ssh-askpass. all the child processes that get spawned from the process that launched ssh-agent inheret certain env variables that let them know how to communicate with the agent, that then provides the key-based authentication for connections. this process can further be forwarded onto another machine, and the real beauty of it is that on the remote machine nothing is stored other than a socket to talk back to the agent on the home machine. for example, this is in my .xsession, and lets me ssh without a password even though i have a passphrase on my key in any child process of my xsession (xterms, et c.): eval `ssh-agent` ssh-add .ssh/id_dsa </dev/null > running w/o a passphrase is still probably the most common > way to perform automated tasks. that is, stuff from cron etc. true. you can however limit what commands can be executed from authorizing with a specific key. it'd be neat to see some way someone could spawn off cron using ssh-agent, but it'd make boot-up require someone be at the console. > if the system is properly secured the chance of a key getting > compromised is not that great. that's no attitude to take towards security. > on my more secure systems I lock them down to key logins only, > so even if they have my root password or account password they > have no opportunity to input them. right, but if they're storing a passphraseless key on another machine to which someone else has root, that someone else now has access to your machine too. if that's your root key... sean
msg27985/pgp00000.pgp
Description: PGP signature