[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: rsh or ssh and authorization over a masqueraded connection.



Christoph Lameter <clameter@waterf.org> writes:

> You can simply decrypt the private key and then no passwords are required.

I couldn't figure out how to do that, but isn't that a little unsafe?

After some more investigation, it looks like the way ssh wants you to
do this is with ssh-agent and ssh-add.  All you have to do is launch
an rxvt with ssh agent like this:

  ssh-agent rxvt&

then add your pass phrase to the agent like this:

  ssh-add

and you'll be able to connect to any server holding your public
identity in ~./ssh/authorized_keys without typing the pass phrase
repeatedly.

This appears to be a way to get around the problems with rsh from a
masqueraded host, and will allow cvs access.  The security is an added
bonus, I suppose.

Thanks
-- 
Rob


--
TO UNSUBSCRIBE FROM THIS MAILING LIST: e-mail the word "unsubscribe" to
debian-user-request@lists.debian.org . 
Trouble?  e-mail to templin@bucknell.edu .


Reply to: