On Tue, 2003-08-12 at 04:21, Lia Lia wrote:
> Hi!
> I am new in Linux and CVS and I could use some advise...
> I recently installed Red Hat 9 to use as a server for CVS. The clients are 
> Windows 2000 and I have WinCvs as a client. My first problem is that the 
> telnet deamon is not running (acording to my netstat the port is 
> listening--and a connection is established for authentication. I just keep 
> getting a "connection to host lost" after i enter the password). Second 

First, I would like to dissuade you from using telnet at all.  SSH (as
you mention further on down) is a much better alternative, providing
encryption and, alternatively, compression.  If it doesn't appear to be
listening on port 22, make sure it is running with "service sshd
status".  See my next answer for possible issues with your firewall.

> problem I cannot open the port for the cvs pserver (i have created the 
> cvspserver in xinetd directory, I use lokkit to open the port but the port 

Whenever you make changes to a service controlled via xinetd, you'll
need to restart the xinetd daemon: "service xinetd restart".  You should
now see the system listening on port 2401.  If not, make sure your
cvspserver config file has "disable = no" (and restart if necessary).

That said, heed my warning about lokkit and its "write-only" mode:
http://marc.theaimsgroup.com/?l=redhat-list&m=106061367803184&w=2

If you're having problems with your firewall, post your
/etc/sysconfig/iptables script, and we can help you edit it manually to
suit your needs.

> does not open according to the netstat). Third, I would like to configure my 
> sshd to use only keys and no passwords to authenticate, so I can connect the 
> cvs client via ssh without constantly entering password. could anyone help??

sshd uses asymmetric keys (private for decryption, public for
encryption) for authentication and encryption.  The first thing you'll
need to do is create your own keys.  Make *ABSOLUTELY CERTAIN* that your
private keys never get compromised.  Keep them in your ~/.ssh
directory.  Never send them across the wire, never share them, nothing.

ssh-keygen -tdsa -b1024 -N ''

It will ask you to name the files, I usually accept the default of
~/.ssh/id_dsa for my private key and ~/.ssh/id_dsa.pub for my public
key.  Note that the "-t" (key type) and "-b" (number of bits) settings
are your choice.  I recommend dsa key types and at least 1024 bits...
you might want to use 2048, depending on a) how paranoid you are, and b)
how much of your system resources you want tied up de/encrypting your
data.

Now, you'll want to copy your public key over to any servers you wish to
setup logins for.  In short, you'll want to concatenate the key into
your remote ~/.ssh/authorized_keys file.  If this file doesn't exist,
you can simply do:

cp id_dsa.pub ~/.ssh/authorized_keys

Otherwise, you'll want to first append a newline to the existing file,
*THEN* add your key:

echo >> ~/.ssh/authorized_keys
cat id_dsa.pub >> ~/.ssh/authorized_keys

Logout, and then log back in.  It should work without a password prompt.

-- 
Jason Dixon, RHCE
DixonGroup Consulting
http://www.dixongroup.net


-- 
redhat-list mailing list
unsubscribe mailto:[EMAIL PROTECTED]
https://www.redhat.com/mailman/listinfo/redhat-list

Reply via email to