I don't bother with that stuff.
One my usernames has a
/home/username/.ssh/authorized_keys which has a public
rsa key in it
then i use the corresponding private key to log in
from another machine (put it in
/home/username/.ssh/id_rsa on a linux box, or
configure a key file in putty for a windows b
On Sat, Jun 18, 2005 at 11:15:25AM +0200, Vincent Lefevre wrote:
> On 2005-06-16 11:51:01 -0500, Thomas Stivers wrote:
> > I ended up going with port knocking and just installed knockd. Too
> > cool, i always thought it was harder to set up than it is. I even
> > have it playing nice with shorewall
On 2005-06-16 11:51:01 -0500, Thomas Stivers wrote:
> I ended up going with port knocking and just installed knockd. Too
> cool, i always thought it was harder to set up than it is. I even
> have it playing nice with shorewall. Thanks for the suggestions.
The problem with port knocking is that it
On Thu, Jun 16, 2005 at 11:57:52 AM -0400, Bradley Alexander wrote:
> Note that there are also a number of methodologies which accomplish the same
> thing using iptables...One such example is at
> https://lists.netfilter.org/pipermail/netfilter/2005-June/060914.html. TThe
> he extension of this
4 matches
Mail list logo