| 
| --=-GomcteejOnwv9ANMXz7y
| Content-Type: text/plain
| Content-Transfer-Encoding: quoted-printable
| 
| On Tue, 2005-08-09 at 10:29 +0300, Jari Aalto wrote:
| > It would be good if the default jail script also populated
| >=20
| >    $CVSDHOME/.ssh/
| >=20
| > with appropriate files to that the admin could add the SSH keys
| > ( .ssh/authorized_keys2 ). This method of accessing cvsd should also
| > be documented in /us/share/doc/cvsd/* (README.Debian?)
| 
| I'm not really sure what you want with a ssh client configuration
| directory in the chroot jail. I'm also not sure what extra protection
| this accessing a cvs pserver over ssh buys you (over direct cvs access
| with the ext method).
| 
| Could you provide some more information?

I misunderstood the location that is used by ssh. It appears
that ssh is invoked first and then cvsd, so there is no need
for $CVSDHOME/.ssh/ - just regular SSH account and $HOME/.ssh
will do.

As for the protection: the idea is to offer minimum ports
to the Net. So instead of visible ports 2401 and 22, the
intruder only sees 22. The services that are offered are
behind the firewall.

It's a kind of multilayered locks. You must first get through
SSH to get access to other services.

Another thing is added encryption (cvs uses cleartext).

Jari



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to