Tutoring on SSD/SSH

David A. Bandel david
Mon May 17 11:35:18 PDT 2004


On 23 Jul 2002 20:55:40 -0500
begin  Michael Hipp <MHipp at redmule.com> spewed forth:

> Yes. Read them. Frankly wasn't able to make much of them as they gave a
> bunch of steps but don't really tell what the end objective/state is.
> 
> Even in the Red Hat documentation it tells how to establish keys and so
> forth but it all seems geared toward making sure the host you're hitting
> is the correct one. Rather than making sure the client is the correct
> one. And it still doesn't really tell what you've accomplished once
> you've done it.
> 
> And there is essentially no docs at openssh.org.
> 
[snip]

Michael,

OK, the answer will depend on whether you're talking about protocol 1 or
2.  They are different.  However, both have similar way to authenticate a
system:

password login  (what you don't want)
rhosts login (a bad idea)
authorized keys (what you want)
rhosts + authorized keys (more restrictive than what you want, but may
stop an authorized host because you can't establish identity)
user logins (more restrictive, but may work as well)

Protocol 1:
RhostsAuthentication: (uses the rhosts file -- a _real_ bad idea)
RhostsRSAAuthentication:  leave as no
RSAAuthentication:  what you want for a protocol 1 client.

Protocol 2:
HostbasedAuthentication:  you don't want this (default no), same as
RhostsAuthentication above (uses hosts.equiv vice rhosts)
PubKeyAuthentication -- WHAT YOU WANT! Default = yes.

Both Protocols:
AllowUsers  takes a list of space separated usernames (or user at host) and
only allows these logins -- might work for you in addition to
PubKeyAuthentication (above).
IgnoreRhosts -- a good idea
IgnoreUserKnownHosts -- a _really_ good idea if you want to control which
hosts can log in.
PAMAuthenticationViaKdbInt -- leave as no.
KerberosOrLocalPassword -- make this no.  Will use Kerberos or fall back
to /etc/passwd.
PasswordAuthentication -- set this to no.
PermitEmptyPasswords -- really bad idea (no one should have a null
password).
PermitRootLogin -- leave this as yes.
UseLogin -- leave as no (you definitely don't want this).

I suggest you restrict logins to protocol 2 if at all possible.  Just
specify:
Protocol 2

Help?

Ciao,

David A. Bandel
-- 
Focus on the dream, not the competition.
		-- Nemesis Racing Team motto



More information about the Linux-users mailing list