[tor-relays] List of Relays' Available SSH Auth Methods
Niklas Kielblock
niklas at spiderschwe.in
Tue Nov 18 18:16:40 UTC 2014
This only applies if you're able to rid your hardware of all evidence of
ever connecting to your node, and have no record of ownership of that
node whatsoever. I find that a fairly unlikely scenario, to be honest.
On 18/11/14 19:10, Dan Rogers wrote:
>
>
> IMO there could occasionally be reasons not to use key logins (although
> I do normally disable pwd login). E.g. if I have a key, I then have
> evidence somewhere (USB/HD), whereas a secure password can be kept only
> in my head (until they waterboard me). Especially in countries (e.g. the
> UK) that can force you to hand over encryption keys. I'd rather have an
> insecure Tor node than get arrested (although tbh with fail2ban
> installed I don't think pwd bruteforcing is a threat).
More information about the tor-relays
mailing list