I think your method is ok if you use it the right way:
Never replace ssh with it, you have to name your script something else. That way you or anyone using it knows that he is doing something more than ssh. Otherwise someone (even you yourself in sleepy mode) might use ssh to do (for example) a login to a root account and make that root account vulnerable.
Also you should be careful what connections you enable. Use this script only to connect from accounts you view as more or equally as secure as the accounts you connect to. Don't connect every account with every other account you have
Public key access and passwords have different weaknesses. Passwords are vulnerable to keyboard sniffers, brute force password guessers and social hacks (the most simple: looking over the shoulder while you type it in). But an attacker needs time to break more of your accounts if he gets access to one of them. public keys are relatively safe against all of above, but an attacker gets them all as soon as he breaks into one.
In reply to Re: Populating authorized_keys with Expect
by jethro
in thread Populating authorized_keys with Expect
by cmv
| For: | Use: | ||
| & | & | ||
| < | < | ||
| > | > | ||
| [ | [ | ||
| ] | ] |