Ssh – long SSH password vs SSH Keys

amazon ec2passwordsshunix

Using amazon's EC2 Service, which is awesome in every regard.

Only problem is, I have problems logging in with the SSH keys they automatically genarate.
I have no idea what the problem is, but have no desire to look any further, as I need to get back to working on my application. …

tl;dr; So, what are the security implications that make SSH keys so much stronger than 20+char long passwords?
From my understanding SSH keys primarily protect against brute force attacks – but if I created a username and password with 20 or 64+ charectors…how much more secure would using keys be?

Best Answer

Well, a typical SSH key is somewhere around 1024 or 2048 bytes. That's a chunk longer than any password you're going to type in a reasonable amount of time. The whole advantage to ssh keys is that your key password (you do set passwords on your ssh keys, right?) is effectively a proxy to the higher security of the key.

The big advantage to keys is that your password never traverses the network. A relatively common attack is to install a trojaned version of the ssh server; when people type in passwords, the modified server records them and sends them elsewhere. This is a particular problem because these same passwords often are used for access to a number of systems/services.

ssh keys largely eliminate this problem.

Ssh keys are usually simple to set up. You stick the public key on the remote system in the appropriate authorized_keys file, and configure your local ssh to present the appropriate private key when you connect. If you're having some specific problems we can probably help you work things out.

Related Topic