<p></p>
<p>@google hope you enjoyed reading this, It had nothing to do with you!<br>
sent from my HTC.<br>
On Sep 30, 2013 6:23 PM, "Paul Smith" <<a href="mailto:paul@mad-scientist.net">paul@mad-scientist.net</a>> wrote:<br>
><br>
> On Mon, 2013-09-30 at 12:48 -0400, Hal Burgiss wrote:<br>
><br>
><br>
> > On Mon, Sep 30, 2013 at 12:14 PM, Paul Smith <<a href="mailto:paul@mad-scientist.net">paul@mad-scientist.net</a>> wrote:<br>
> > On Mon, 2013-09-30 at 17:06 +0100, Colin Law wrote:<br>
> > > On 30 September 2013 16:55, Kent Borg <<a href="mailto:kentborg@borg.org">kentborg@borg.org</a>> wrote:<br>
> > > > On 09/29/2013 10:48 AM, Hal Burgiss wrote:<br>
> > > > On Sat, Sep 28, 2013 at 2:17 PM, Kent Borg <<a href="mailto:kentborg@borg.org">kentborg@borg.org</a>> wrote:<br>
> > > >> Yes, private keys are encrypted--if you encrypt them. So if someone has<br>
> > > >> your private key, they still need to break any encryption.<br>
> > > ><br>
> > > > Huh?<br>
> > > ><br>
> > > > You sound confused. What part don't you get?<br>
> > ><br>
> > > If someone has your private key then they have your private key.<br>
> > > There is no encryption that they need to break.<br>
><br>
> > I'm sure that Kent is assuming that you've added a passphrase to your<br>
> > private key; anyone who cares about the security of their private key<br>
> > will certainly do this.<br>
> ><br>
> > If the key has a passphrase then just having the key file won't help,<br>
> > you also must have, or be able to guess, the passphrase.<br>
><br>
><br>
> > That's a passphrase, unrelated to "encryption". All ssh keys (public<br>
> > and private) are *encrypted* when they are created using dsa, rsa,<br>
> > and probably other options as well. The man page seems to make this<br>
> > perfectly clear. If for some reason, you add any additional encryption<br>
> > (which is how I am understanding Kent's comment), then they would not<br>
> > be usable as-is by sshd.<br>
><br>
> I don't understand the distinction you're trying to make here, and I<br>
> don't think I agree with your terminology.<br>
><br>
> A (passphrase-less) private key is not "encrypted". A private key is,<br>
> basically, a mathematical value which can be fed into a deterministic<br>
> algorithm. It is used to perform encryption and decryption, but it,<br>
> itself, is not encrypted. It can be considered to be "encoded", since<br>
> the binary value is translated into a long string of hex digits for<br>
> convenient storage and distribution, but it's not encrypted since it can<br>
> be used directly without needing to be combined with any other<br>
> information.<br>
><br>
> A private key file with a passphrase is encrypted: getting a copy of the<br>
> key file alone won't let you use it. The contents of the file must be<br>
> processed with the passphrase as input in order to change it back into a<br>
> usable file. Just like any other encrypted file.<br>
><br>
> > And passphrases completely break unattended processes that some of us<br>
> > need to do (ie for system to system backups, etc).<br>
><br>
> Of course there are many uses for passphrase-less keys. They provide a<br>
> convenience of unattended remote access, with at least some amount of<br>
> security. They're equivalent, authentication-wise, to writing a script<br>
> containing the password needed to log in remotely, only ssh/scp are far<br>
> more convenient than telnet/ftp (and they encrypt traffic, but that's<br>
> not an authentication feature).<br>
><br>
> However one should not imagine that those are any more secure than your<br>
> local disk. I create different keys for this kind of access and I'd<br>
> NEVER use those for any other purpose. All the keys I use for<br>
> interactive access to other servers always have a strong passphrase.<br>
><br>
> > In fact, sshd creates system passphraseless public/private key pairs<br>
> > during installation in /etc/ssh. These are courtesy of Ubuntu and ssh<br>
> > maintainers.<br>
><br>
> Those are host keys. They have a completely different purpose: they're<br>
> there to avoid man-in-the-middle attacks (to prove that the server<br>
> you're talking to is the one that you think it is). Only the SSH daemon<br>
> needs to read those private keys so they're owned by, and readable only<br>
> by, root on the server. If an attacker can read those key files then<br>
> they already have root access to the server and you've already lost.<br>
><br>
> You should never use host keys as normal public/private keys for user<br>
> accounts, not even root.<br>
><br>
><br>
> Cheers!<br>
><br>
><br>
> --<br>
> ubuntu-users mailing list<br>
> <a href="mailto:ubuntu-users@lists.ubuntu.com">ubuntu-users@lists.ubuntu.com</a><br>
> Modify settings or unsubscribe at: <a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-users">https://lists.ubuntu.com/mailman/listinfo/ubuntu-users</a><br></p>
<p>Thanks for you clarity! I've been following this thread with interest, as I am currently setting up a home media server, and I was thinking (tentatively) of allowing remote access from selected locations, and I was getting a bit jargon hazed!</p>
<p>Pete s</p>