Talk about the wrong way to make a piece of software. I was helping a friend get iGet working with his mac. We did not want to leave SSH running on port 22. It was getting hit with all sorts of brute force user guessing attacks. Here are some examples
Sep 4 09:29:27 sshd: Invalid user admin
Sep 4 09:29:37 sshd: Invalid user stud
Sep 4 09:29:45 sshd: Invalid user trash
Sep 4 09:29:51 sshd: Invalid user aaron
Sep 4 09:29:56 sshd: Invalid user gt05
Sep 4 09:30:00 sshd: Invalid user william
Sep 4 09:30:03 sshd: Invalid user stephanie
Sep 4 09:30:40 sshd: Invalid user gary from
Sep 3 16:51:06 sshd: Invalid user nagios
Sep 3 16:51:07 sshd: Invalid user backuppc
Sep 3 16:51:09 sshd: Invalid user wolfgang
Sep 3 16:51:10 sshd: Invalid user vmware
Sep 3 16:51:13 sshd: Invalid user stats
Sep 3 16:51:14 sshd: Invalid user kor
Sep 3 16:51:15 sshd: Invalid user wei
Sep 3 16:51:16 sshd: Invalid user cvsuser
Also we wanted to fix up public key authentication instead of passwords. So we used his Apple airport extreme to map an external port say 3622 to 22 on his Mac in his home network. Then we whipped up public-private key pair. “ssh-keygen -t rsa” was good enough to do that. We of course put a good strong passphrase on it.
Now things like iTerm and Cyberduck on the mac worked great with his new setup. Both the port and the private key. But he has this thing called iGet. It claims key support. But I did let it work with key authentication if the private key had a passphrase. So we had to whip up a second keypair just for that program and append the new public key to his authorized_keys file in his .ssh folder. The worst part is the vendor tried to say that using keys is not inherently more secure than a password because iGet just uses SSH to start the connection then takes over with its own protocol. How stupid. And such a bad attitude. Cyberduck is free and it works way better on key support. Sure iGet has some neat features like access to the remote machine’s spotlight etc. But kiss that advantage goodbye once Leopard comes out. But personally I would not give iGet my money for their product with that attitude and poor private key with passphrase support. By default keys get dumped right into your .ssh folder on a Mac. If there is no passphrase and someone somehow runs code that lets them grab the entire folder contents they would have your access into machines via SSH. At least if it has a passphrase they still have to brute force the key just to use it.
After all it is not two factor authentication if it is just a key without a passphrase. Its one factor. Something you have. Adding something you know (the passphrase) greatly improves the security so in the world of iGet 2=1.