On Tue, Mar 11, 2003 at 02:58:14AM +0100, martin f krafft wrote:
> also sprach Colin Watson <[EMAIL PROTECTED]> [2003.03.11.0109 +0100]:
> > Oh, I see. Then you should use a forced command in
> > ~/.ssh/authorized_keys, establishing the security context on the server
> > side. For example, my dynamic DNS is set up using a passphraseless key
> > and this line in the authorized_keys file on the server side:
> > 
> >   command="userv dyndns dyndns dynamic.greenend.org.uk 
> > riva",no-pty,no-port-forwarding 1024 35 ...
> 
> right, but then i'd have to manage this file, which is everything but
> nice.

Don't understand. It's easy.

What are you actually trying to *do*?

> i am trying to solve exactly this problem though. how nice would
> it be if sshd spawned a shell and gave it something like
> $SSH_DSA_KEYID for its environment.

Hm, environment variable cruft ...

Cheers,

-- 
Colin Watson                                  [EMAIL PROTECTED]


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to