Re: [PLUG] ssh public/private key login authentication?

2014-07-06 Thread Pete Lancashire
If your granting him limited access lock him from going outside his home directory tree. Enable auditing, look at the logs from time to time. Recent versions of sshd can restrict to a IP/range. A few to.start with. On Jul 4, 2014 6:35 PM, "Keith Lofstrom" wrote: > Question? > > Without getting in

[PLUG] followup on gcc 4.8.1 removal attempt

2014-07-06 Thread website reader
Steve: I left the old gcc 4.8.1 on the drive, and did not force any removal. Yast2 software management on openSuse seems to run slightly faster than my old synaptics on Ubuntu. ___ PLUG mailing list PLUG@lists.pdxlinux.org http://lists.pdxlinux.org/mailm

Re: [PLUG] ssh public/private key login authentication?

2014-07-06 Thread Ronald Bynoe
And if you're Cisco, you also embed your private key in the firmware of your VoIP product line so you don't lose it. Just in case you wanted a really easy backdoor for the entire platform shipped with every piece of hardware. Security is important! (; On Jul 6, 2014 10:31 AM, "Russell Johnson" w

Re: [PLUG] ssh public/private key login authentication?

2014-07-06 Thread Russell Johnson
On Jul 4, 2014, at 8:38 PM, Russell Senior wrote: > The main thing is that you are sure you have the right public key. > So, you could pipe the public key through sha512sum or something and > recite the hash over the phone to be sure it's the same at both ends. > The public key doesn't need to b