On Jul 4, 2014, at 8:38 PM, Russell Senior russ...@personaltelco.net wrote:
The main thing is that you are sure you have the right public key.
So, you could pipe the public key through sha512sum or something and
recite the hash over the phone to be sure it's the same at both ends.
The public
And if you're Cisco, you also embed your private key in the firmware of
your VoIP product line so you don't lose it. Just in case you wanted a
really easy backdoor for the entire platform shipped with every piece of
hardware. Security is important!
(;
On Jul 6, 2014 10:31 AM, Russell Johnson
If your granting him limited access lock him from going outside his home
directory tree. Enable auditing, look at the logs from time to time. Recent
versions of sshd can restrict to a IP/range. A few to.start with.
On Jul 4, 2014 6:35 PM, Keith Lofstrom kei...@gate.kl-ic.com wrote:
Question?
Question?
Without getting into incompetence, impersonation,
man-in-the-middle, drugs and pipe wrenches ...
I have a friend in another state who I want to give ssh access
to on one of my machines. If I understand ssh key exchange,
1) he makes a private/public key pair for openssh
1a) using
most recent distributions of ssh just use 'authorized_keys'. It
wouldn't hurt having both, but then
you won't know which is required :-). I guess, 'man ssh' will tell you
there right answer. But who reads docs. (Ubuntu 14.4 no longer mentions
authorized_keys2)
Dont forget permissions for the
On Fri, Jul 04, 2014 at 06:35:03PM -0700, Keith Lofstrom wrote:
Question?
Without getting into incompetence, impersonation,
man-in-the-middle, drugs and pipe wrenches ...
I have a friend in another state who I want to give ssh access
to on one of my machines. If I understand ssh key
Keith == Keith Lofstrom kei...@gate.kl-ic.com writes:
Keith Question? Without getting into incompetence, impersonation,
Keith man-in-the-middle, drugs and pipe wrenches ...
Keith I have a friend in another state who I want to give ssh access
Keith to on one of my machines. If I understand ssh