Utility to scan for unpassworded SSH privkeys?
    Alan Barrett 
    apb at cequrux.com
       
    Sun May 26 05:54:26 EST 2013
    
    
  
On Sat, 25 May 2013, Damien Miller wrote:
> Offering a control in ssh_config that is trivially bypassed is 
> not giving out users security, it's selling them a lie.
No, it's neither security nor a lie, it's education, and it is 
beneficial.
An error message of the form "I refuse to use that 
non-password-protected key" can certainly be bypassed by editing a 
config file or installing a different ssh client, but users won't 
always bypass the message, they will sometimes add a password to 
their key, which is the desired result.  Editing the configuration 
or installing a different ssh client might be a violation of 
company policy, and the users will at least think about that 
before doing it.  Even if it's a personal system with no company 
policy involved, the user will think at least a little about 
whether to edit the config option or to add a password.
--apb (Alan Barrett)
    
    
More information about the openssh-unix-dev
mailing list