Skip to main content

You are not logged in. Your edit will be placed in a queue until it is peer reviewed.

We welcome edits that make the post easier to understand and more valuable for readers. Because community members review edits, please try to make the post substantially better than how you found it, for example, by fixing grammar or adding additional resources and hyperlinks.

Required fields*

5
  • I use ssh-copy-id to copy my credentials to the other system, and ssh root@other, scp -l root ... Commented Dec 1, 2015 at 23:54
  • 1
    Related: security.stackexchange.com/q/66894/47143 Commented Dec 2, 2015 at 10:42
  • I have a problem with the way this question is asked: Why would a connection as priviledged user somehow imply "using a ssh key", and why would a connection as unpriviledged user imply "entering passwords"? Commented Dec 2, 2015 at 10:54
  • 2
    @DevSolar Passwords entered at login aren't susceptible to the timing attack mentioned above, so it doesn't matter if a ssh-key or password is used during initial authentication. The important part is that sudo almost always requests the user's password, which is the password input that I was referring to when talking about "connecting as an unpriviledged user". Please feel free to edit the question if it you think it should be improved. Commented Dec 2, 2015 at 11:05
  • @tarleb: Ah... forget what I said. I hadn't actually read the abstract of the paper and thought you were concerned about the typing of the password for the ssh connection, not the one for sudo itself. Commented Dec 2, 2015 at 12:09