>       Actually this is sort of relevant to the list. I have modified
> ssh (both 1.2.x and 2.x) to use s/key as one of the authentication
> methods (and actually, to force it as one) which is what I use for all
> of my secure server (i.e., firewalls, web servers, ftp servers, etc.)
> interactive management, file copies to secure servers using scp in
> conjunction w/ rdist and remote management of client sites that I have
> set up via a vpn pipe on the internet.

It shouldn't be necessary to modify ssh to support s/key.  If you build
Wietse's logdaemon package, the /bin/login replacement supports s/key, and you
just tell sshd to UseLogin yes in the sshd_config.

-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to