Re: hosts based open ssh authentication

2014-11-03 Thread Darac Marjal
On Sat, Nov 01, 2014 at 09:50:44PM +, Bhasker C V wrote: > Hi all > > I have a system in a cluster (experimental) and there are a lot of > debian machines which depend on this system and must be able to ssh into > this system > > I wanted password-less authentication and looked on the intern

Re: hosts based open ssh authentication

2014-11-02 Thread Lars Noodén
On 11/2/14, Gary Dale wrote: > On 01/11/14 05:50 PM, Bhasker C V wrote: >> Hi all >> >> I have a system in a cluster (experimental) and there are a lot of >> debian machines which depend on this system and must be able to ssh into >> this system >> >> I wanted password-less authentication and lo

Re: hosts based open ssh authentication

2014-11-02 Thread Gary Dale
On 01/11/14 05:50 PM, Bhasker C V wrote: Hi all I have a system in a cluster (experimental) and there are a lot of debian machines which depend on this system and must be able to ssh into this system I wanted password-less authentication and looked on the internet. Almost all the examples and

hosts based open ssh authentication

2014-11-01 Thread Bhasker C V
Hi all I have a system in a cluster (experimental) and there are a lot of debian machines which depend on this system and must be able to ssh into this system I wanted password-less authentication and looked on the internet. Almost all the examples and help shown involves setting up ssh_known_ho

Re: Custom SSH Authentication

2012-09-10 Thread Karl E. Jorgensen
Hii On Fri, Sep 07, 2012 at 10:04:51PM +0100, Alex Robbins wrote: > I am looking to set up a custom SSH authentication system. I have a several > RSA key pairs for my user, and I want to restrict ssh access based on which > key pair is being used (not based on user name). On top of tha

Re: Custom SSH Authentication

2012-09-09 Thread Alex Robbins
On 09/08/2012 02:55 AM, Brian wrote: On Fri 07 Sep 2012 at 16:04:51 -0500, Alex Robbins wrote: I am also hoping to take it a step further and say that the restricted key (the one that only works at certain times) also requires that a pass phrase be provided that changes based on an arbitrary al

Re: Custom SSH Authentication

2012-09-09 Thread Chris Davies
Alex Robbins wrote: > I am looking to set up a custom SSH authentication system. I have a several > RSA key pairs for my user, and I want to restrict ssh access based on which > key pair is being used (not based on user name). On top of that, I want > to restrict keys based on time

Re: Custom SSH Authentication

2012-09-08 Thread shawn wilson
On Sep 8, 2012 4:13 AM, "Brian" wrote: > > On Fri 07 Sep 2012 at 16:04:51 -0500, Alex Robbins wrote: > > > I am looking to set up a custom SSH authentication system. I have a several > > RSA key pairs for my user, and I want to restrict ssh access based on which

Re: Custom SSH Authentication

2012-09-08 Thread Brian
On Fri 07 Sep 2012 at 16:04:51 -0500, Alex Robbins wrote: > I am looking to set up a custom SSH authentication system. I have a several > RSA key pairs for my user, and I want to restrict ssh access based on which > key pair is being used (not based on user name). On top of that, I

Re: Custom SSH Authentication

2012-09-08 Thread Brian
On Fri 07 Sep 2012 at 16:04:51 -0500, Alex Robbins wrote: > I am also hoping to take it a step further and say that the restricted key > (the one that only works at certain times) also requires that a pass phrase > be provided that changes based on an arbitrary algorithm, perhaps involving > the t

Re: Custom SSH Authentication

2012-09-07 Thread Glenn English
On Sep 7, 2012, at 3:04 PM, Alex Robbins wrote: > I am looking to set up a custom SSH authentication system. I have a several > RSA key pairs for my user, and I want to restrict ssh access based on which > key pair is being used (not based on user name). On top of that, I want >

Custom SSH Authentication

2012-09-07 Thread Alex Robbins
I am looking to set up a custom SSH authentication system. I have a several RSA key pairs for my user, and I want to restrict ssh access based on which key pair is being used (not based on user name). On top of that, I want to restrict keys based on time of day. In short, a certain key can

Re: ssh authentication woes

2001-06-07 Thread Mike Egglestone
Hey Andrew... Are you saying that a user can ssh into a "linux box with X windows" and have X windows access through ssh? this is very cool... Where can I find info to set this up? thanks Mike > Nope, it's even easier than that: > #ssh -X remote > will tunnel X over ssh without any other se

Re: ssh authentication woes

2001-06-07 Thread Andrew D Dixon
Alvin Oga wrote: > > hi michael > > am guessing, you want to login into the remote machine > and have it display stuff local on your pc??? > > lets say remote == 1.2.3.4 > lets say here == 5.6.7.8 ( where you;re sitting ) > > here# xhost +1.2.3.4 > > here# ssh -l michael remote > -

Re: ssh authentication woes

2001-06-07 Thread ANDREW PERRIN
Not exactly, but close (BTW, I'm a different Andrew :)) - a user with an X server (of any type - Linux, U*x, Windows, etc.) and an ssh client can ssh into a correctly-configured Linux (or U*x) machine and have X applications running on the remote host automatically display locally using ssh tunnell

Re: ssh authentication woes

2001-06-07 Thread Alvin Oga
hi michael am guessing, you want to login into the remote machine and have it display stuff local on your pc??? lets say remote == 1.2.3.4 lets say here == 5.6.7.8 ( where you;re sitting ) here# xhost +1.2.3.4 here# ssh -l michael remote - enter passwd remote# export DISPLAY=5.6.7

ssh authentication woes

2001-06-07 Thread Michael Kevin O'Brien
Hola~ I'm really trying to be a good debian citizen. I need to do the equivalent: % rsh remotehost % setenv DISPLAY myhost:0 % some-x-program I can rsh no problem. However, I can't get ssh to let me access remotehost. I've got a null passwd on remotehost, same acount name. I've tried

Re: ssh authentication

2000-11-30 Thread robert_wilhelm_land
"Noah L. Meyerhans" wrote: > > On Wed, Nov 29, 2000 at 04:38:09PM +0100, robert_wilhelm_land wrote: > > > > > > No! Don't do this! By doing so you are lowering the security level of > > > your machine down to your user account. It's bad enough that security > > > depends on a root account; i

Re: ssh authentication

2000-11-29 Thread Noah L. Meyerhans
On Wed, Nov 29, 2000 at 04:38:09PM +0100, robert_wilhelm_land wrote: > > No! Don't do this! By doing so you are lowering the security level of > > your machine down to your user account. It's bad enough that security > > depends on a root account; it should *never* depend on a user account. >

Re: ssh authentication

2000-11-29 Thread robert_wilhelm_land
"Robert L. Harris" wrote: > > Yes you need to restart it. The command would be to run > the sshd start from your init. This SHOULD be either: > > /etc/init.d/sshd restart > > or > > /etc/rc.d/init.d/sshd restart > > depending on your system. You will then need to re-login. this worked :

Re: ssh authentication

2000-11-29 Thread Robert L. Harris
Yes you need to restart it. The command would be to run the sshd start from your init. This SHOULD be either: /etc/init.d/sshd restart or /etc/rc.d/init.d/sshd restart depending on your system. You will then need to re-login. Robert Thus spake robert_wilhelm_land ([EMAIL PROTECTED]):

Re: ssh authentication

2000-11-29 Thread robert_wilhelm_land
Karsten wrote: > Linking files under /root to normal user files is, in general, a Bad > Thing[tm]. > > Instead, do this the right way, running as root: > > xauth -merge ~//.Xauthority > > You'll have to re-run this when updating your user xauth key, but this > generally happens rarely. "" -

Re: ssh authentication

2000-11-29 Thread robert_wilhelm_land
Carel Fellinger <[EMAIL PROTECTED]> wrote: > On Tue, Nov 28, 2000 at 07:20:37PM +0100, robert_wilhelm_land wrote: > ... > > Nevertheless I tried to use ssh on the local mashine called MINI while > > logged in as user "rland" and using one of the xterm's: > > ssh -l root MINI > > - the system then

Re: ssh authentication

2000-11-29 Thread robert_wilhelm_land
"Noah L. Meyerhans" <[EMAIL PROTECTED]> wrote: > On Tue, Nov 28, 2000 at 07:20:37PM +0100, robert_wilhelm_land wrote: > > > As root in root's home directory, make .Xauthority a symbolic link to > > > your normal user's .Xauthority file (or set the XAUTHORITY environment > > > variable to the locat

Re: ssh authentication

2000-11-28 Thread Noah L. Meyerhans
On Tue, Nov 28, 2000 at 07:20:37PM +0100, robert_wilhelm_land wrote: > > As root in root's home directory, make .Xauthority a symbolic link to > > your normal user's .Xauthority file (or set the XAUTHORITY environment > > variable to the location of that file). Then you can just run X programs > >

Re: ssh authentication

2000-11-28 Thread Carel Fellinger
On Tue, Nov 28, 2000 at 07:20:37PM +0100, robert_wilhelm_land wrote: ... > Nevertheless I tried to use ssh on the local mashine called MINI while > logged in as user "rland" and using one of the xterm's: > > ssh -l root MINI > > - the system then prompts me for the password and I keyed the root

Re: ssh authentication

2000-11-28 Thread kmself
on Tue, Nov 28, 2000 at 07:20:37PM +0100, robert_wilhelm_land ([EMAIL PROTECTED]) wrote: > Colin Watson wrote: > > > [EMAIL PROTECTED] wrote: > > >logged as a normal user I would like to open up X-apps requiring root > > >permissions. > > > > As root in root's home directory, make .Xauthority a

Re: ssh authentication

2000-11-28 Thread robert_wilhelm_land
Colin Watson wrote: > [EMAIL PROTECTED] wrote: > >logged as a normal user I would like to open up X-apps requiring root > >permissions. > > As root in root's home directory, make .Xauthority a symbolic link to > your normal user's .Xauthority file (or set the XAUTHORITY environment > variable to

Re: ssh authentication

2000-11-16 Thread Hubert Chan
[EMAIL PROTECTED] (robert_wilhelm_land) writes: > logged as a normal user I would like to open up X-apps requiring root > permissions. I've been able to open X-apps as root using sudo. IMHO, sudo should be a required package in Debian. Hubert

Re: ssh authentication

2000-11-15 Thread Colin Watson
[EMAIL PROTECTED] wrote: >logged as a normal user I would like to open up X-apps requiring root >permissions. As root in root's home directory, make .Xauthority a symbolic link to your normal user's .Xauthority file (or set the XAUTHORITY environment variable to the location of that file). Then yo

ssh authentication

2000-11-15 Thread robert_wilhelm_land
logged as a normal user I would like to open up X-apps requiring root permissions. I was told on this list to use ssh by "ssh [EMAIL PROTECTED]" and creating ~/.ssh/config with the contents: Host localhost User root Compression no I did so and ssh asked for a password. The usual root password wa