46
8
I have a server which I have to access frequently via ssh, because I compute on it. Now, the computing center explicitly forbids SSH-keys because they are "insecure". They feel that typing my password, on a keyboard, everytime, possible in front of other humans, is a much safer way to login.
Now; I cannot change their minds (I tried).
Is there a way to at least temporarily store SSH passwords, the way GIT can store passwords in a cache for some defined time?
55
the computing center explicitly forbids SSH-keys because they are "insecure"
- my opinion on the matter? Find a new server host, because yours is obviously inept. – Matt Clark – 2018-10-01T15:28:03.88018@Matt: "computing center" sounds more like an academic grid system, which doesn't have nearly as much competition I guess – user1686 – 2018-10-01T16:18:11.560
27They are wrong. They have probably been forgetting to disable ssh keys when they expire accounts, so they decided that ssh keys are the problem. – Joshua – 2018-10-01T16:20:50.057
10grawity is right. it's a national supercomputer so I'm stuck with it. for what it's worth, the machine is nice. Joshua is probably right as well, but, well, that's the kind of right not good for anything – user2667180 – 2018-10-01T18:55:01.947
Are you sure it doesn't support other authentication systems such as Kerberos or GSI (Globus) though? Both of these are fairly common and secure, and support credential persistence. – user1686 – 2018-10-01T19:02:35.647
2Does your department have a white-hat hacking team? Many companies have one of these, and they essentially test the company's security by launching real attacks and reporting the results. The data these guys get back could let you guys know whether SSH keys or passwords are more secure (and they could very easily swing in favor of the former by installing keyloggers). – TheHansinator – 2018-10-02T05:39:52.000
7@TheHansinator If there is a keylogger installed you have already been compromised to the point where it no longer matters whether you are protecting your ssh connections. But there are other advantages of
publickey
authentication. If you disablepassword
authentication on the server, you prevent all of those attackers trying to guess passwords. And if an attacker attempt a mitm attack against a client which has not previously stored the public key of the server, you are much better protected withpublickey
than if you were usingpassword
authentication. – kasperd – 2018-10-02T08:04:21.810@kasperd Is there a reason you are using code block for emphasis? Not many screen readers read code blocks as emphasis, and just call call them out as "code" instead. – Ferrybig – 2018-10-03T14:30:08.587
@Ferrybig I use code blocks because these are identifies with a very specific meaning to ssh. You can use those strings verbatim in an
ssh
command line or configuration file. I have no idea how a screen reader deals with any of the markup on StackExchange, and I do not feel qualified to have an opinion on how it should be treated. If it doesn't work in a sensible way I wouldn't even know if the screen reader or StackExchange is to blame. Further questions about that might be suitable for meta. – kasperd – 2018-10-03T15:23:05.537