Tzafrir Cohen wrote:
On Tue, Jun 10, 2008 at 02:00:49AM -0600, Nathaniel Homier wrote:
I have the private key backed up on a desktop computer. The pass phrase
was generated with a high quality pseudo-random number generator using
20 characters consisting of letters, numbers and symbols. The
On Tue, Jun 10, 2008 at 02:00:49AM -0600, Nathaniel Homier wrote:
> I have the private key backed up on a desktop computer. The pass phrase
> was generated with a high quality pseudo-random number generator using
> 20 characters consisting of letters, numbers and symbols. The key
> strength i
Sudev Barar wrote:
2008/6/10 Nathaniel Homier <[EMAIL PROTECTED]>:
Yep, I got my key based auth working great now. I also took the time to
disable all other auth. Did "/etc/init.d/ssh restart" and checked again and
all is well. I carry my public and private key on my thumb drive and the
priva
Sudev Barar wrote:
2008/6/10 Nathaniel Homier <[EMAIL PROTECTED]>:
The nicknames are a good idea. I can pretend that I am on the Nostromo when
I am using mother. :)
;-)
It would be good idea to re-jig configuration file at son to allow
only key based authentication. This way even ssh log in
H.S. wrote:
Nathaniel Homier wrote:
I have 1 desktop computer (we will call it son) and it runs a ssh
server. When I visit my mothers house I would like to be able to
access (son) from my mothers computer (we will call it mom). I have
setup the
Here is what I do (I use this method to acce
Nathaniel Homier wrote:
I have 1 desktop computer (we will call it son) and it runs a ssh
server. When I visit my mothers house I would like to be able to access
(son) from my mothers computer (we will call it mom). I have setup the
Here is what I do (I use this method to access my univ lab
Alan Chandler wrote:
Jochen Schulz wrote:
Nathaniel Homier:
I have 1 desktop computer (we will call it son) and it runs a ssh
server. When I visit my mothers house I would like to be able to access
(son) from my mothers computer (we will call it mom). I have setup the
ssh server on (son) to u
Jochen Schulz wrote:
> Nathaniel Homier:
>>
>> I have 1 desktop computer (we will call it son) and it runs a ssh
>> server. When I visit my mothers house I would like to be able to access
>> (son) from my mothers computer (we will call it mom). I have setup the
>> ssh server on (son) to use key
Nathaniel Homier:
>
> I have 1 desktop computer (we will call it son) and it runs a ssh
> server. When I visit my mothers house I would like to be able to access
> (son) from my mothers computer (we will call it mom). I have setup the
> ssh server on (son) to use key based authentication.
I have 1 desktop computer (we will call it son) and it runs a ssh
server. When I visit my mothers house I would like to be able to access
(son) from my mothers computer (we will call it mom). I have setup the
ssh server on (son) to use key based authentication. Now the question
is, do I run
10 matches
Mail list logo