[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: rsh or ssh and authorization over a masqueraded connection.



Use RSA User authentication instead of RSA Host authentication.

You need to run keygen and then put your public key on the host you want to reach.
Get rid of the .shosts file and the pain of passwords is gone. You can put your private
key on any account you want to use to connect from.

In article <[🔎] 87iuznyzo4.fsf@nevermore.csres.utexas.edu> you wrote:

: Is it possible to set up password free logins (for rsh or ssh) to a
: server via a masqueraded connection?  I spent quite a bit of time
: recently trying to figure this out, and it seemed like the host really
: didn't want to let this happen.  Something about incoming connections
: from a non-privileged port being used.

:   [ server ] --- ppp --- [ masquerading host ] --- [masqueraded host] 

: The connections go through without a hitch when I try from the
: masquerading host but won't work from the masqueraded host, even when
: I'm careful (for ssh) about the known_hosts and .shosts file contents.



-- 
--- +++ --- +++ --- +++ --- +++ --- +++ --- +++ --- +++ ---
Please always CC me when replying to posts on mailing lists.


--
TO UNSUBSCRIBE FROM THIS MAILING LIST: e-mail the word "unsubscribe" to
debian-user-request@lists.debian.org . 
Trouble?  e-mail to templin@bucknell.edu .


Reply to: