Date: Sun, 24 Sep 2000 23:57:39 -0500 From: Dave Uhring <duhring@charter.net> To: "Daniel O'Connor" <doconnor@gsoft.com.au> Cc: freebsd-stable@freebsd.org, Joakim Ryden <jo@ForumOne.Com> Subject: RE: Login Message-ID: <00092423591402.09773@dave.uhring.com> In-Reply-To: <XFMail.000925142313.doconnor@gsoft.com.au> References: <XFMail.000925142313.doconnor@gsoft.com.au>
next in thread | previous in thread | raw e-mail | index | archive | help
On Sun, 24 Sep 2000, Daniel O'Connor wrote: > On 25-Sep-00 Dave Uhring wrote: > > If the client box doesn't have your public key in its > > /root/.ssh/authorized_keys file, it will be unable to generate the encrypted > > random number it needs to send for authentication. On each client box, > > That is untrue, you do NOT need to have someones public key in your authorized > keys file for them to be able to securly login. > > Adding their public key to your authorized keys file will allow them to login > using RSA authentication (ie public/private key checking) however. > > > Placing > > your master box's public key in authorized_keys works. > > Errm I think you should have a good read of the man pages :) > > --- > Daniel O'Connor software and network engineer > for Genesis Software - http://www.gsoft.com.au > "The nice thing about standards is that there > are so many of them to choose from." > -- Andrew Tanenbaum Whatever. I've been using ssh since last December when OpenBSD 2.6 was released. My last statement above holds. Dave To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-stable" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?00092423591402.09773>