so far i have done

edit /etc/sshd_config

Port 22
Protocol 2
PermitRootLogin no
MaxStartups 5:50:10
X11Forwarding no
PrintLastLog yes
SyslogFacility auth
LogLevel VERBOSE
PasswordAuthentication no
PermitEmptyPasswords no
Banner /etc/issue
AllowGroups sshusers  <-- this exsists
        
# create some group that you can put OpenSSH users into
        Next, we'll open and edit /etc/ssh/ssh_config

[EMAIL PROTECTED] /dir]#vi /etc/ssh/ssh_config

ForwardAgent no
ForwardX11 no
PasswordAuthentication no
CheckHostIP yes
Port 22
Protocol 2


then i su to unpriv user and ran ssh-keygen -d

then i did cat id_dsa.pub > authorized_keys2


make sure you have a line in /etc/ssh/sshd_config that points to this, like so:

AuthorizedKeysFile      .ssh/authorized_keys2

If it's commented out that's okay (default) just make sure it's the same filename you've used!

(Incidentally, on my 5.3 box it's set as .ssh/authorized_keys)


then copy the id_dsa.pub to a floppy so that i could transfer the dsa key to the machine from which id be accessing the unix box.


No, you need to put the PRIVATE key (id_dsa by default) on the client machines in the .ssh directory under each users' home dir. The PUBLIC key stays on the server in authorized_keys as you've done above. Make sure this key and the directory it's in is accessible only by the user you want.


Hope that helps,

G


_______________________________________________ freebsd-questions@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-questions To unsubscribe, send any mail to "[EMAIL PROTECTED]"

Reply via email to