I use different keys for every device, so my home PC has a set, I have a set at UCC, a set on my laptop, and so on. This has the advantage that when I lose my USB stick, like I did a few months back, I can just revoke that key and keep using the same set on everything else.
Passwordless private keys is a very, very bad habit to get into, although it's fine at UCC on machines that mount /home if you're only using it to access UCC systems.
See, I've never really understood why unencrypted private keys are as terrible as people make them out to be. As long as you don't ever give other people access to them (or, enough access for them to copy them to a remote location), they're no less secure than keeping the keys in memory, right?
Comments 5
Passwordless private keys is a very, very bad habit to get into, although it's fine at UCC on machines that mount /home if you're only using it to access UCC systems.
Reply
Reply
Reply
Reply
export OLD_SSH_AUTH=$SSH_AUTH_SOCK
export SSH_AUTH_SOCK=~/.ssh/auth/$HOST-ssauth
Then I have a program ~/bin/ss that I run instead of 'screen -r':
#!/bin/zsh
rm -f ~/.ssh/auth/$HOST-ssauth
ln -s $OLD_SSH_AUTH ~/.ssh/auth/$HOST-ssauth
screen -rd -S ucc
(the -S ucc is so that if I have other special-purpose screens then they don't get interfered with). SSHKeychain for os x is useful.
Reply
Leave a comment