[nycbug-talk] Public-key sudo?
edlinuxguru at gmail.com
Sun Jan 8 00:23:49 EST 2012
You can tell people to lock their SSH keys keys with a password and store
them on an encrypted drive, but counting on users is something I never do.
People can strip the password encoded off a key, or chose to use some what
ssh client that stores the key password in a non encrypted file.
I used to like LDAP and Kerberos but a high percentage of admins hate LDAP
auth. People who know LDAP and/or Kerberos are a serious minority. I have
had the fight multiple times (the infamous LDAP is more more thing to
break) argument. So I have moved on with my life.
My argument is: I use SSH keys because the client server interaction is not
based on short text strings that are easy to give away. I can push out keys
to appropriate servers and control access.
I definitely understand why people do not like NOPASSWD, but I just do not
get having a password for sudo when it does not take one to get into the
system. I do not count the password the user chose to lock there key as a
On Sat, Jan 7, 2012 at 8:32 PM, Pete Wright <pete at nomadlogic.org> wrote:
> On Sat, 07 Jan 2012 17:25:31 -0800, Edward Capriolo <edlinuxguru at gmail.com>
> It isn't lazyness. When I was "sold" on SSH keys the concept was that
>> passwords are hard to rotate and not safe because people write them down
>> napkins, share them, etc. So since I have "bought into" this philosophy it
>> seems contradictory to me to have sudo use a password.
> well your keys are locked with a password, aren't they? so i'm not sure
> that is a good argument to use ssh key based authentication...
> Pete Wright
> pete at nomadlogic.org
-------------- next part --------------
An HTML attachment was scrubbed...
More information about the talk