diff options
author | Jameson Graef Rollins <jrollins@phys.columbia.edu> | 2008-08-16 10:08:24 -0700 |
---|---|---|
committer | Jameson Graef Rollins <jrollins@phys.columbia.edu> | 2008-08-16 10:08:24 -0700 |
commit | 9d31bf789228de4126164e4349f19f288c9e7bb0 (patch) | |
tree | 326254a47634c2ba45fcde7e3cb00023d4eec955 /website/index.mdwn | |
parent | 1a17d5082447dd76f52df929bfe2f0855512c9f9 (diff) | |
parent | ae661bf9fd9ce62069a99bb9de16df8b44beee8a (diff) |
Merge commit 'dkg/master'
Diffstat (limited to 'website/index.mdwn')
-rw-r--r-- | website/index.mdwn | 13 |
1 files changed, 7 insertions, 6 deletions
diff --git a/website/index.mdwn b/website/index.mdwn index 853c75b..8ff984d 100644 --- a/website/index.mdwn +++ b/website/index.mdwn @@ -9,7 +9,7 @@ yourself and the servers you administer or connect to. OpenPGP keys are tracked via GnuPG, and managed in the `known_hosts` and `authorized_keys` files used by OpenSSH for connection authentication. -[[bugs]] | [[download]] | [[news]] | [[documentation|doc]] +[[bugs]] | [[download]] | [[news]] | [[documentation|doc]] | [why should i be interested?](/why) ## Conceptual overview ## @@ -26,13 +26,14 @@ keys for authenticating to a server (known as "`PubkeyAuthentication`"), rather than relying on a password exchange. But again, the public part of the key needs to be transmitted to the server through a secure out-of-band channel (usually via a separate -password-based SSH connection) in order for this type of -authentication to work +password-based SSH connection or a (hopefully signed) e-mail to the +system administrator) in order for this type of authentication to +work. [OpenSSH](http://openssh.com/) currently provides a functional way to -managing the RSA and DSA keys required for these interactions through -the `known_hosts` and `authorized_keys` files. However, it lacks -any type of [Public Key Infrastructure +manage the RSA and DSA keys required for these interactions through +the `known_hosts` and `authorized_keys` files. However, it lacks any +type of [Public Key Infrastructure (PKI)](http://en.wikipedia.org/wiki/Public_Key_Infrastructure) that can verify that the keys being used really are the one required or expected. |