[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: how to examine ssh problem

>>>>> Alan Chandler <alan@chandlerfamily.org.uk> writes:

 > (I actually have loads of these in my config file for all different
 > combinations of username and host - I also tend to make different key
 > pairs for each host which is why I am specifying an IdentityFile in
 > each.)

	Why?  The asymmetric cryptography employed by SSH is there
	precisely to /not/ have multiple “secrets” on the side of the
	party being authenticated.

	The authentication systems based on symmetric cryptography (say,
	Kerberos), indeed, require the authenticated party to have a
	distinct shared secret for each of the “authentication realms”
	(say, Kerberos realms) it belongs to

FSF associate member #7257

Reply to: