Orna Agmon wrote:

Asking for password is a regular behavior on account of the ssh. If you do
not really need a secure connection, you can use either rsh, rlogin or
other remote shell tools, which should be easily configured to rely on the
authentication you made while getting into one computer, and allow you the
same user name in others. No, I don't know where exactly to tweak this.


Create a file in your home dir called ".rhost". It's very very very recommended against.

These tools are not safe, of course. Not only are they not encrypted, but
they also enable someone to connect his/her machine to the network, tell
the machine it has a certain hostname and a certain ip, define a username
on it (say root), and immediately connect to your network.

If I understand correctly, the way to create an ssh without a password
involves re-entering your passphrase for your gpg key every time you init
your X. For details, see the following howto:

http://www.cs.umd.edu/~arun/misc/ssh.html

Orna.


No, not exactly.

SSH can allow public key authentication. This means you create a key, and you use this key to prove to the ssh server that you are who you say you are. RTFM ssh, and look for "public key authentication", or "authorized_keys".

Now, if your key is encrypted, you can use the ssh agent to store the password. Most distros have the ssh agent running when you log in, which means you have to do "ssh-add" once after logging in.

If your key is not encrypted, you can just use ssh without a password.

Shachar

--
Shachar Shemesh
Lingnu Open Source Consulting
http://www.lingnu.com/


-------------------------------------------------------------------------- Haifa Linux Club Mailing List (http://www.haifux.org) To unsub send an empty message to [EMAIL PROTECTED]




Reply via email to