> Key based authentication is the right way to go. You should disable > root ssh access completely. > Key based authentication is good, but there is one caveat. Straight key based allows you to log in directly without typing a password. If you are ssh'ing from work to home from a UNIX machine, any sys-admin with the root password on your work machine can become you and then ssh to your home machine as you with no password. Maybe you don't care if your sysadmin is dinking around in your home machine and maybe you do. I am not saying not to use key based authentication, but it is not a cure all. Bob Styma