Mailing List Archive
tlug.jp Mailing List tlug archive tlug Mailing List Archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]Re: [tlug] rsync ssh error
- Date: Tue, 20 Jun 2023 20:50:57 +0900
- From: "Stephen J. Turnbull" <turnbull.stephen.fw@example.com>
- Subject: Re: [tlug] rsync ssh error
- References: <f423352d-e7df-e03b-5367-1a5e0b92d41b@l.u-tokyo.ac.jp> <5694B042-C66D-4D81-94EA-E0082D85840D@zuco.org> <df85fbfe-6a8b-4092-57bb-50d8a5766cb0@dcook.org>
Darren Cook writes: > The OP is using this ssh key for backups across their 192.168.*.* > network. Is an attacker who *already has access to the LAN*, going > to spend $50K on hacking your ssh key? Probably not. On the other hand, depending on the amount of automation involved, it's mostly just a matter of the user(s) typing 'y' once per key used in logging in. So the cost of changing could be as low a few minutes to generate a high-quality host key-pair, one login, and one 'y'. We know that cost will only get cheaper over time. Of course if you have many scripts spread across a lot of hosts and each one has its own known-hosts file, the PITA factor goes way up, especially if (as in the case of timely backups) it's a potentially existential threat if the script fails. > Not a rhetorical question; if you are a prominent politician/ > celebrity, and if there are other users on the LAN (*), then maybe > your secrets are worth that. Of course, it's also possible that somebody has already reduced the cost to $5 and the 90 day grace period ends tomorrow. :-) Steve
- References:
- [tlug] rsync ssh error
- From: Charles Muller
- Re: [tlug] rsync ssh error
- From: Pietro Zuco
- Re: [tlug] rsync ssh error
- From: Darren Cook
Home | Main Index | Thread Index
- Prev by Date: Re: [tlug] rsync ssh error
- Previous by thread: Re: [tlug] rsync ssh error
- Next by thread: Re: [tlug] rsync ssh error
- Index(es):