Hi Lohit,

Ssh supports multiple authentication methods, starting from host-based
to key-based.  The most secure is key-based authentication, since only
your system holds the key which allows you to login to the ssh server
system, and only you have the passphrase which can unlock that key.

Have a look at the sshd manual for more information.

Regards,

-- Raju

>>>>> "Lohit" == Lohit  <[EMAIL PROTECTED]> writes:

    Lohit> Hi Raj, Thanx a lot. That *really* helped me understanding
    Lohit> the application.  Now I think its simple socket programming
    Lohit> left. :) .

    Lohit> One more query. Does the ssh server keeps information about
    Lohit> user identity?  SO that even if someone else grabs the
    Lohit> password (unauthorized), he cant enter the server without
    Lohit> sending the identification certificate? Do we need some
    Lohit> cnfiguration in sshd?

    >>> Hi Lohit,
    >>> 
    >>> Yes, you can tunnel almost any TCP protocol through SSH, and
    >>> no, you don't need a Perl module.
    >>> 
    >>> Here's a sample scenario:
    >>> 
    >>> Your daemon is running on server system S on port 5555 The ssh
    >>> daemon is running on S (required) Your client is connecting
    >>> from client system C.  ,...........  .............  to port
    >>> 1234 on system S.  In fact, /anyone/ who connects to port 9999
    >>> on C will be automatically, securely be connected to S:1234.
    >>> 
    >>> HTH,
    >>> 
    >>> -- Raju

-----------------------------------------------------------------------
The LIH mailing list archives are available at:
http://lists.linux-india.org/cgi-bin/wilma/linux-india-help

Reply via email to