> From: tech-boun...@lists.lopsa.org [mailto:tech-boun...@lists.lopsa.org]
> On Behalf Of Luke S. Crawford
> 
> what is the advantage of your scheme over traditional public key auth?
> (e.g. openssh public keys)

If you generate an ssh key, you have to keep it with you.  If you lose it, you 
cannot authenticate.  This is fine in some cases, for some things, particularly 
where the user is expected to be technical or performing a job or something.

Fundamentally, that's the reason why websites and servers often now, 
authenticate using a password instead of expecting users to have ssh keys.  The 
downside of using password authentication is that users need to send their 
password to the server.

What CBcrypt does is to deterministically and repeatably create the same 
keypair every time you authenticate using the same password at the same site 
with the same username.  This is *not* as secure as using password protected 
ssh key authentication, but it's a big improvement for servers that otherwise 
require users to send a password.  And there are a LOT of servers out there 
that require users to send in their passwords.
_______________________________________________
Tech mailing list
Tech@lists.lopsa.org
https://lists.lopsa.org/cgi-bin/mailman/listinfo/tech
This list provided by the League of Professional System Administrators
 http://lopsa.org/

Reply via email to