Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 10 Sep 2001 18:02:39 +0100
From:      Alex Holst <a@area51.dk>
To:        Freebsd-security@FreeBSD.ORG
Subject:   Re: allow selective RSA AUTH in sshd setup?
Message-ID:  <20010910180239.B59628@area51.dk>
In-Reply-To: <Pine.BSF.4.10.10109101235200.46378-100000@federation.addy.com>; from jim@federation.addy.com on Mon, Sep 10, 2001 at 12:53:35PM -0400
References:  <001c01c1385e$d8e43400$f0f2a118@tampabay.rr.com> <Pine.BSF.4.10.10109101235200.46378-100000@federation.addy.com>

next in thread | previous in thread | raw e-mail | index | archive | help
Quoting Jim Sander (jim@federation.addy.com):
>    By default, I bar key-based logins (RSAAuthentication no) so that I
> don't have to worry about users keeping their ~/.ssh/authorized_keys
> secure. 

I assume you mean ~/.ssh/identity on the client side? If it's your server,
you can enforce rules on authorized_keys. I'm somewhat puzzled as RSA keys
are significantly stronger plain passwords. What do you use for
authentication? SecurID? CryptoCard?

You would need to take a look at login.conf to specify individual
authentication methods on a per user basis. I am not clear on how well this
is supported yet.

-- 
I prefer the dark of the night, after midnight and before four-thirty,
when it's more bare, more hollow.                  http://a.area51.dk/


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20010910180239.B59628>