[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: identifying [DR]SA key used for ssh key-based login



also sprach Colin Watson <cjwatson@debian.org> [2003.03.10.1454 +0100]:
> Set 'LogLevel VERBOSE' in /etc/ssh/sshd_config and the key fingerprint
> will be syslogged. (This currently doesn't work for RSA1 keys due to a
> bug in privilege separation.)

only DSA keys being used, so no problem.

this is one step closer, but it's not really that great. the reason
why i want to enable it is because i want one unprivileged account to
do a certain task, and i would like to use the SSH key used to log in
to establish the security context of the task.

does anyone here have a connection into the OpenSSH team and could
forward a feature request? i'd prefer not to enlist with the mailing
list...

-- 
Please do not CC me when replying to lists; I read them!
 
 .''`.     martin f. krafft <madduck@debian.org>
: :'  :    proud Debian developer, admin, and user
`. `'`
  `-  Debian - when you have better things to do than fixing a system
 
NOTE: The pgp.net keyservers and their mirrors are broken!
Get my key here: http://people.debian.org/~madduck/gpg/330c4a75.asc

Attachment: pgpX9xMLHMI66.pgp
Description: PGP signature


Reply to: