Hi Siddharth,

    The SSH setup is one of the most secure authentication methods for
logging in. It actually exchanges machine fingerprints(a long hashed key)
and the next time a registered client wants to login, the system looks for
the fingerprint. If the fingerprint is found in it's .ssh config file then
it automatically authenticates else denies. As evident, there is no question
of login id and password which I think is exactly what you have been looking
for. However, this process will make authentication restricted to only one
machine per registered user.

   @ Deepak,Siddharth: Flaws in other methods such as Mac Id is that one can
easily change the mac address within seconds(with or without applications)
to hack the system and the same can be done with machine ids as they can be
exploited very easily on network with tools.

Regards,
Satyajeet Singh
Sent from Pune, MH, India

On Mon, Sep 7, 2009 at 7:54 PM, Siddharth Goyal <[email protected]> wrote:

>
>
> Hello
> The main problem is that I do not wish to make things too complicated for
> people who log in and I do not wish people to share their login ids with
> people and even if they do, it should be worthless. The SSH setup that you
> refer to. Is it a machine dependent setup? (Pardon my ignorance).
> Because if it only depends on a user name and a password, it is not useful
> for me no matter how secure the user id and password may be.
>
> On Mon, Sep 7, 2009 at 10:38 AM, Satyajeet Singh <[email protected]>wrote:
>
>>
>>
>> Hi Siddharth,
>>
>>      The problem is that Microsoft doesn't allow you to share environment
>> variables in any other environment other that IE which makes it very easy to
>> hack using browsers like Firefox wherein you will be prompted with an input
>> dialog box which will accept any value and will treat it as original
>> environment variable.
>>
>>      What about some SSH setup with the clients you want to authenticate?
>> This can be done by creating a config file in your .ssh directory. I have
>> seen this implementation for accessing remote Unix terminals but I guess
>> this might be used for this purpose too.
>>
>> Regards,
>> Satyajeet Singh
>>
>
>
>
> --
> regards,
> Siddharth Goyal | http://www.sidgoyal1.com
> CEO, Dulcet Solutions | http://www.dulcetsolutions.com
> +91-9818666217
>  
>

Reply via email to