Re: rsh or ssh and authorization over a masqueraded connection.
Christoph Lameter <clameter@waterf.org> writes:
> You can simply decrypt the private key and then no passwords are required.
I couldn't figure out how to do that, but isn't that a little unsafe?
After some more investigation, it looks like the way ssh wants you to
do this is with ssh-agent and ssh-add. All you have to do is launch
an rxvt with ssh agent like this:
ssh-agent rxvt&
then add your pass phrase to the agent like this:
ssh-add
and you'll be able to connect to any server holding your public
identity in ~./ssh/authorized_keys without typing the pass phrase
repeatedly.
This appears to be a way to get around the problems with rsh from a
masqueraded host, and will allow cvs access. The security is an added
bonus, I suppose.
Thanks
--
Rob
--
TO UNSUBSCRIBE FROM THIS MAILING LIST: e-mail the word "unsubscribe" to
debian-user-request@lists.debian.org .
Trouble? e-mail to templin@bucknell.edu .
Reply to: