Keep SSH Sessions Active, Or Reconnect? 307
borjonx writes "Is it safer to log out of an SSH session, and re-establish it later, or just keep the connection open? Like many of you, I use OpenSSH to connect to my Slackware Linux boxes remotely from Linux and WinXP (putty.exe) clients. At home and at work, I wonder if it would be safer to just leave the connection open (my clients are physically secured, the servers limit connections with hosts.allow). Is it more secure to re-establish the connection over an insecure link (big bad internet) where people can sniff that handshaking, or is it more secure to just remain connected? I connect 1 to 4 times per day, most days."
Re:screen (Score:5, Funny)
Just drive a blue car if you want it to catch on fire, you mean. The ONLY time I have ever had a car catch on fire it was blue.
Depends... (Score:2, Funny)
Re:all of the above (Score:4, Funny)
Are you crazy? Obviously the two encryptions would cancel out each other!
Or... (Score:3, Funny)
When you cross the two encryption streams you may get total protonic reversal, or you may get 1 REALLY POWERFUL STREAM.
Re:screen (Score:3, Funny)
And I currently have two laptops that I amd repairing - both of them have buggered screens.
Oh, and then there's the "Blue Screen of Death" - though I've only seen one PC burst into flames after a BSOD, so that was probably a coincidence...
Re:screen (Score:2, Funny)
I've had two cars catch fire ... both blue!!! I think you're on to something ...
Ah, the feared ROT13 cypher? (Score:2, Funny)
Yes, you are correct, but you may want to upgrade from ROT-13 to ROT-26.
Boring... (Score:3, Funny)
This is exactly the sort of question that Stack Overflow was created for....
Re:screen (Score:3, Funny)
blue, brown and bi-colored all start with the letter b
Like many of us ... (Score:5, Funny)
Like many of you, I use OpenSSH to connect to my Slackware Linux boxes remotely
If many of us are connecting to your Slackware boxes, reconnecting is not your largest vulnerability!
(sorry, couldn't resist)
Re:Wat (Score:3, Funny)
Ideally, you would to verify that fingerprint with a version you get through alternate, presumably secure, means. E.g. an over-the-phone conversation with an administrator
So what if this administrator you're having such a secure conversation with has someone holding a gun to his head! Guess you're not so secure now, huh?