Answer the question
In order to leave comments, you need to log in
Where does it make sense to store private SSH keys on Windows?
As far as I know, keys are stored in `C:\Users\XXXX\.ssh` by default. If for some technical reasons the keys need to be stored in this directory, then an explanation of this reason will be a valid answer to this question.
If there is no such reason, then within the framework of my current knowledge the train of thought is as follows
: disk is meaningless.
2. Getting to the .ssh folder is not very convenient, and the meaning of its name is not obvious.
In view of this logic, I think that it is possible to create a folder `SSH Private Keys` (or even in Russian - `SSH Private Keys`) on the `D` (or other non-system) drive and store them there. The only thing is, if there are several users, you need to restrict access to this folder.
Is this methodology a security risk?
Answer the question
In order to leave comments, you need to log in
If for some technical reasons the keys need to be stored in this directory, then an explanation of this reason will be a valid answer to this question.
2. Getting to the .ssh folder is not very convenient, and the meaning of its name is not obvious.
1. The system disk is more vulnerable than the secondary one (well, or it is a priority target for attackers - there must be some reason why it makes no sense to save a system backup to the system disk).
2. Getting to the .ssh folder is not very convenient, and the meaning of its name is not obvious.
cat ~/.ssh/id_rsa.pub
In view of this logic, I think that it is possible to create a folder `SSH Private Keys` (or even in Russian - `SSH Private Keys`) on the `D` (or other non-system) drive and store them there. The only thing is, if there are several users, you need to restrict access to this folder.
Keep the private key wherever you want, in any place you think is safe, just don't take it outside the machine on which it was generated and don't show it to anyone.
Only when connecting, you will need to specify the path to the private key, but ssh-agent helps to solve this problem.
1. The system disk is more vulnerable than the secondary one (well, or it is a priority target for attackers - there must be some reason why it makes no sense to save a system backup to the system disk).A good virus scans all drives, including network drives.
The only thing is, if there are several users, you need to restrict access to this folder.Properties -> Security -> Advanced. Delete everyone, add your user with full access - you're done. But, administrators can still get access. To check if the settings are correct, try opening the folder as a different user.
1. The system disk is more vulnerable than the secondary one (well, or it is a priority target for attackers - there must be some reason why it makes no sense to save a system backup to the system disk).
there must be some reason why saving a system backup to the system drive does not make sense
2. Getting to the .ssh folder is not very convenient, and the meaning of its name is not obvious.
Didn't find what you were looking for?
Ask your questionAsk a Question
731 491 924 answers to any question