On 01/04/2008, Russell L. Harris <[EMAIL PROTECTED]> wrote: > > SYSTEM: > > (1) firewall/router (SmoothWall Express 2.0) which (using NAT) > provides and protects both a "green" zone for a LAN and an > "orange" zone ("DMZ") for a publicly-accessible server > > (2) ftp or http server in the DMZ > > (3) desktop machine in the LAN from which the sysop maintains the > server > > SITUATION: > > It is convenient to use "scp" for transferring files between the > desktop machine in the LAN and the server, and to use "ssh" for > remote maintenance of the server, again from the desktop machine > in the LAN. And to eliminate the constant typing of password, > ssh-agent can be installed. > > Such remote maintenance of the server from a machine in the LAN > becomes tedious unless there is on each machine an account with > the same username, password, and passphrase. > > QUESTION: > > Is there a major or unreasonable security risk if the sysop > creates on the server an account with the same username, password, > and passphrase as his account on the desktop machine? That is, if > the server is compromised, should the sysop change his password, > passphrase, etc.? > > If so, what is the recommended alternative? Is there a HOWTO on > this subject? > > RLH
Hey, There is definately an alternative. ssh can authenticate using public keys. `ssh-keygen` generates a public and private keypair. Echo the public portion into ~/.ssh/authorized_keys on the dmz server and keep the private portion with the sysop. Copy the private key portion into ~/.ssh on the hosts that the sysop is using and you won't need a password. This works cross user. [EMAIL PROTECTED] can login to [EMAIL PROTECTED] provided she has the private key and the public key is in bob's authorized_keys file. To enable this you need to uncomment/add to /etc/ssh/sshd_config: PubkeyAuthentication yes AuthorizedKeysFile %h/.ssh/authorized_keys HTH, cheers, Owen. -- > To UNSUBSCRIBE, email to [EMAIL PROTECTED] > with a subject of "unsubscribe". Trouble? Contact > [EMAIL PROTECTED] > >