Date: Mon, 10 Sep 2001 18:02:39 +0100 From: Alex Holst <a@area51.dk> To: Freebsd-security@FreeBSD.ORG Subject: Re: allow selective RSA AUTH in sshd setup? Message-ID: <20010910180239.B59628@area51.dk> In-Reply-To: <Pine.BSF.4.10.10109101235200.46378-100000@federation.addy.com>; from jim@federation.addy.com on Mon, Sep 10, 2001 at 12:53:35PM -0400 References: <001c01c1385e$d8e43400$f0f2a118@tampabay.rr.com> <Pine.BSF.4.10.10109101235200.46378-100000@federation.addy.com>
next in thread | previous in thread | raw e-mail | index | archive | help
Quoting Jim Sander (jim@federation.addy.com): > By default, I bar key-based logins (RSAAuthentication no) so that I > don't have to worry about users keeping their ~/.ssh/authorized_keys > secure. I assume you mean ~/.ssh/identity on the client side? If it's your server, you can enforce rules on authorized_keys. I'm somewhat puzzled as RSA keys are significantly stronger plain passwords. What do you use for authentication? SecurID? CryptoCard? You would need to take a look at login.conf to specify individual authentication methods on a per user basis. I am not clear on how well this is supported yet. -- I prefer the dark of the night, after midnight and before four-thirty, when it's more bare, more hollow. http://a.area51.dk/ To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20010910180239.B59628>