simonhoare wrote:Ah - that's reassuring. But "no" is even more secure, right? I basically have another PC that I use as a practise local server. I only ever want to SSH into that machine without anybody being able to SSH into the main machine. So "no" is more appropriate for that than without password, right?
Theoretically, yes. But normally there won't be any keys stored in /root/.ssh, so nobody could connect as root using key authentication unless they could get in and install some keys. So I don't think it provides any greater security against an initial attack, but there is an argument that it provides a way for a successful attacker to leave a door open for future exploits. But to protect against that, you also need something like msec that gaurds against changes to the sshd config.
For your main requirement, just disable the ssh server on your main machine. That way nobody can connect to it, even if they've gained access to your practise server.
P.S. Statements here are true to the best of my knowledge - but I don't claim to be a security expert!