This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revision | Last revisionBoth sides next revision | ||
tutorials:ssh-sdf [2012/02/15 13:33] – Remove obsolete paragraph. memnon | tutorials:ssh-sdf [2012/02/15 15:19] – memnon | ||
---|---|---|---|
Line 45: | Line 45: | ||
Logging in with SSH key authentication means that you do not have to use your SDF account password. Instead, you generate a ' | Logging in with SSH key authentication means that you do not have to use your SDF account password. Instead, you generate a ' | ||
- | This may sound insecure or easily exploitable. In fact though, due to much research and theory, it can be very secure. Notice "can be" in that last sentence. The key files are taking the place of a password in proving to the server that you're really you. Just like you have to keep passwords secret, the strength of this method relies on you following certain guidelines. You will generate a pair of mathematically related keys: one public and the other private. **You should never give out your private key, nor should you make the file that contains it readable by any other user. This would be like storing your password in a world-readable file.** Only your *public* key will be listed on the server. Ensuring that your private key remains private is the most important of the guidelines that I mentioned. On to the instructions: | + | This may sound insecure or easily exploitable. In fact though, due to much research and theory, it can be very secure. Notice "can be" in that last sentence. The key files are taking the place of a password in proving to the server that you're really you. Just like you have to keep passwords secret, the strength of this method relies on you following certain guidelines. You will generate a pair of mathematically related keys: one public and the other private. |
=== Windows instructions === | === Windows instructions === |