ssh

This is part of The Pile, a partial archive of some open source mailing lists and newsgroups.



Subject: Re: Remote Access for Root and Microimages Xserver
From: Jan Carlson <janc@iname.com>
Date: Thu, 17 Jun 1999 11:52:26 -0400


"Rev. David P. Giffen" wrote:
> 
> A couple of questions for everyone.
> 
> 1. Normally I would be pleased as punch that by default you can't access
> Root remotely. However I have a machine that I want to run remotely and
> need to be able to access root. How do I change root so that I can do
> this? I am running a 5.2 machine.

FTP the ssh-1.2.27 rpms from ftp.replay.com.
It's a secure telnet replacement.
Install the ssh rpms on both machines.

"putty" is an ssh for Win32.
 
===


 Subject: Re: how can i make ssh do .rhosts type of auth?
From: Steve Borho <steve@borho.myip.org>
Date: Wed, 13 Oct 1999 21:58:47 -0500


On Wed, Oct 13, 1999 at 09:01:59PM -0500, Nitesh Dhanjani wrote:
> 
> Hi,
> 
> I want to setup ssh so I dont have to type in my password when I login
> from a trusted machine, how do I set this up? What key files do I need to
> have in my ~/.ssh ? Is there a way to do this if Im not root on any of the
> involved hosts?

setup a null passphrase when you run ssh-keygen, then create a .ssh/config
file that looks like this:

Host my_server_name
   RhostsAuthentication no
   RhostsRSAAuthentication no
   PasswordAuthentication no
   FallBackToRsh no
   UseRsh no

I'm not sure which of those you actually need, but it works for me.

===


Subject: Re: ssh
From: "Todd A. Jacobs" <nospam@codegnome.org>
Date: Tue, 7 Dec 1999 13:41:25 -0800 (PST)

On Tue, 7 Dec 1999, Steve Lee wrote:

> how do i setup ssh not to timeout at all.

Remove the IdleTimeout setting in sshd_config.

===

Subject: Re: ssh
From: Steve Lee <maillist@blitzen.net>
Date: Tue, 7 Dec 1999 13:56:07 -0800 (PST)


i don't have that in my sshd_config
is it this instead

LoginGraceTime 600

===

Subject: ssh-1.2.27-7 RPMs (security update)
From: Jan Kasprzak <kas@informatics.muni.cz>
Date: Tue, 7 Dec 1999 11:51:07 +0100

	I have built the new RPMs of secure shell. The only one fix
since the previous release is the buffer overrun fix in RSAref (rsa.c),
described in Core-SDI advisory from December 1. Thanks to Oystein Viggen
for reporting this.

	RPMs are available in source form as well as the binaries for
i386 (glibc2.1 and 2.0), alpha and sparc (32-bit). All packages are
PGP-signed by my key <kas@fi.muni.cz> and are available at

	ftp://ftp.fi.muni.cz/pub/ssh/local-fi.muni.cz/linux/

and they will be available at ftp.zedz.net (used to be ftp.replay.com)
soon (currently the packages are uploaded in /pub/replay/incoming).

===

Subject: Re: restricted shells
From: Rick Moen <rick@hugin.imat.com>
Date: Wed, 15 Sep 1999 10:58:36 -0700


Quoting Jerry Wilcox (jwilcox@slip.net):

[http://linuxmafia.com/pub/linux/security/ssh-clients:]

> In case you haven't already found out, this link, plus other links 
> you posted in this series of articles, gets a '404 Not Found'.

My apologies:  I moved my public ftp tree, late last night, and
forgot to tell Apache about it.  All the aforementioned URLs should
be fixed, now.

I was trying to find a more-secure ftpd than wu-ftpd-academ and ProFTPd,
both of which have crufty design and a history of problems.  I finally
settled on TrollTech's free-software troll-ftp (after a bizarre
misadventure with Dan Bernstein's anonftpd).

===

--
asd

the rest of The Pile (a partial mailing list archive)

doom@kzsu.stanford.edu