On Tue, Feb 02, 2010 at 09:06:09PM -0500, Edward Ned Harvey spake thusly:
> Why is it so common to jump to the conclusion that keys-only-ssh is
> more secure than passwords?

Because then you can't get in even if you have the password (but
nothing else)?

> I somewhat or sometimes disagree with this.  When you use ssh keys,
> it's a virtual certainty that the keys are stored on the client's
> disk ... 

Yep.

> and a lot of users will not protect the key itself with a password
> or encryption.

I love ssh key auth but yes, this is a huge problem. I have been in
shops where key auth was prohibited because they could never be sure
if a user ever put a password on the key. And due to the way
encryption works you cannot tell if the key is just entropy or
encrypted entropy.

> I think if you don't protect your key with a password, it's easier
> to compromise a system by stealing someone's keys than it is to
> brute force a password, even though the password is a smaller number
> of bits.

Then you have to know that the key is unprotected, where the key
reside, and compromise that machine. But you are probably right,
easier than guessing a good password.

> The proper way to do it (Plan A) is to use keys only, but ensure your keys 
> are themselves protected by password.

Ensure how? I think making it clear that creating an unencrypted key
is a firing offense is good enough but others disagree and insist on
technical measures.

I do a lot of PCI security work these days. I have a good book on PCI
security (I don't recall the name at the moment and don't have it on
hand) which explicitly says that encrypted ssh keys (key plus
password) counts as two factor authentication for the purposes of
PCI. But brings us to the classic question: It may check the box
saying "must have two factor auth" but is it really secure enough?

> Point is:  At the server, yes you have the ability to enforce a password 
> complexity requirement.  No, you don't have the ability to enforce a 
> keys-must-be-encrypted-on-the-client-laptop policy.

Yep.

-- 
Tracy Reed
http://tracyreed.org

Attachment: pgpAyu25EHjed.pgp
Description: PGP signature

_______________________________________________
Discuss mailing list
Discuss@lopsa.org
http://lopsa.org/cgi-bin/mailman/listinfo/discuss
This list provided by the League of Professional System Administrators
 http://lopsa.org/

Reply via email to