Ubuntu server remote file access

Pete Smout smoutpete at gmail.com
Mon Sep 30 17:39:39 UTC 2013


@google hope you enjoyed reading this, It had nothing to do with you!
sent from my HTC.
On Sep 30, 2013 6:23 PM, "Paul Smith" <paul at mad-scientist.net> wrote:
>
> On Mon, 2013-09-30 at 12:48 -0400, Hal Burgiss wrote:
>
>
> > On Mon, Sep 30, 2013 at 12:14 PM, Paul Smith <paul at mad-scientist.net>
wrote:
> >         On Mon, 2013-09-30 at 17:06 +0100, Colin Law wrote:
> >         > On 30 September 2013 16:55, Kent Borg <kentborg at borg.org>
wrote:
> >         > > On 09/29/2013 10:48 AM, Hal Burgiss wrote:
> >         > > On Sat, Sep 28, 2013 at 2:17 PM, Kent Borg <
kentborg at borg.org> wrote:
> >         > >> Yes, private keys are encrypted--if you encrypt them.  So
if someone has
> >         > >> your private key, they still need to break any encryption.
> >         > >
> >         > > Huh?
> >         > >
> >         > > You sound confused.  What part don't you get?
> >         >
> >         > If someone has your private key then they have your private
key.
> >         > There is no encryption that they need to break.
>
> >         I'm sure that Kent is assuming that you've added a passphrase
to your
> >         private key; anyone who cares about the security of their
private key
> >         will certainly do this.
> >
> >         If the key has a passphrase then just having the key file won't
help,
> >         you also must have, or be able to guess, the passphrase.
>
>
> > That's a passphrase, unrelated to "encryption". All ssh keys (public
> > and private) are *encrypted*  when they are created using dsa, rsa,
> > and probably other options as well. The man page seems to make this
> > perfectly clear. If for some reason, you add any additional encryption
> > (which is how I am understanding Kent's comment), then they would not
> > be usable as-is by sshd.
>
> I don't understand the distinction you're trying to make here, and I
> don't think I agree with your terminology.
>
> A (passphrase-less) private key is not "encrypted".  A private key is,
> basically, a mathematical value which can be fed into a deterministic
> algorithm.  It is used to perform encryption and decryption, but it,
> itself, is not encrypted.  It can be considered to be "encoded", since
> the binary value is translated into a long string of hex digits for
> convenient storage and distribution, but it's not encrypted since it can
> be used directly without needing to be combined with any other
> information.
>
> A private key file with a passphrase is encrypted: getting a copy of the
> key file alone won't let you use it.  The contents of the file must be
> processed with the passphrase as input in order to change it back into a
> usable file.  Just like any other encrypted file.
>
> > And passphrases completely break unattended processes that some of us
> > need to do (ie for system to system backups, etc).
>
> Of course there are many uses for passphrase-less keys.  They provide a
> convenience of unattended remote access, with at least some amount of
> security.  They're equivalent, authentication-wise, to writing a script
> containing the password needed to log in remotely, only ssh/scp are far
> more convenient than telnet/ftp (and they encrypt traffic, but that's
> not an authentication feature).
>
> However one should not imagine that those are any more secure than your
> local disk.  I create different keys for this kind of access and I'd
> NEVER use those for any other purpose.  All the keys I use for
> interactive access to other servers always have a strong passphrase.
>
> > In fact, sshd creates system passphraseless public/private key pairs
> > during installation in /etc/ssh. These are courtesy of Ubuntu and ssh
> > maintainers.
>
> Those are host keys.  They have a completely different purpose: they're
> there to avoid man-in-the-middle attacks (to prove that the server
> you're talking to is the one that you think it is).  Only the SSH daemon
> needs to read those private keys so they're owned by, and readable only
> by, root on the server.  If an attacker can read those key files then
> they already have root access to the server and you've already lost.
>
> You should never use host keys as normal public/private keys for user
> accounts, not even root.
>
>
> Cheers!
>
>
> --
> ubuntu-users mailing list
> ubuntu-users at lists.ubuntu.com
> Modify settings or unsubscribe at:
https://lists.ubuntu.com/mailman/listinfo/ubuntu-users

Thanks for you clarity! I've been following this thread with interest, as I
am currently setting up a home media server, and I was thinking
(tentatively) of allowing remote access from selected locations, and I was
getting a bit jargon hazed!

Pete s
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.ubuntu.com/archives/ubuntu-users/attachments/20130930/26935d41/attachment.html>


More information about the ubuntu-users mailing list