Re: identifying [DR]SA key used for ssh key-based login
On Tue, Mar 11, 2003 at 02:58:14AM +0100, martin f krafft wrote:
> also sprach Colin Watson <cjwatson@debian.org> [2003.03.11.0109 +0100]:
> > Oh, I see. Then you should use a forced command in
> > ~/.ssh/authorized_keys, establishing the security context on the server
> > side. For example, my dynamic DNS is set up using a passphraseless key
> > and this line in the authorized_keys file on the server side:
> >
> > command="userv dyndns dyndns dynamic.greenend.org.uk riva",no-pty,no-port-forwarding 1024 35 ...
>
> right, but then i'd have to manage this file, which is everything but
> nice.
Don't understand. It's easy.
What are you actually trying to *do*?
> i am trying to solve exactly this problem though. how nice would
> it be if sshd spawned a shell and gave it something like
> $SSH_DSA_KEYID for its environment.
Hm, environment variable cruft ...
Cheers,
--
Colin Watson [cjwatson@flatline.org.uk]
Reply to: