![]() | ![]() |
Mit der Dummheit kämpfen Götter selbst
vergebens.
(Against stupidity, even the Gods struggle in vain.)
-- Friedrich von Schiller
Security tools don't secure anything; they only help people to do so. It's almost a cliché, but so important that it bears any amount of repeating. The best cryptography or most secure protocols in the world won't help if users pick bad passwords, or write their passphrases on Post-it notes stuck to the undersides of their keyboards. They also won't help sysadmins who neglect other aspects of host security, allowing host-key theft or wiretapping of terminal sessions.
As Bruce Schneier is fond of saying, "Security is a process, not a product." SSH is a good tool, but it must be part of an overall and ongoing process of security awareness. Other aspects of host integrity must still be attended to; security advisories for relevant software and operating systems monitored, appropriate patches or workarounds applied promptly, and people educated and kept aware of their security responsibilities. Don't just install SSH and think that you're now secure; you're not.![]() | ![]() | ![]() |
3.10. Threats SSH Can Counter | ![]() | 3.12. Summary |
Copyright © 2002 O'Reilly & Associates. All rights reserved.