Am Donnerstag, den 06.07.2006, 09:51 +0200 schrieb [EMAIL PROTECTED]: > Hi, > > I checked the permissions, but the RSA authentication persists to > refuse to work. > > I bypassed that problem: by copying the file /etc/shadow of the LTSP > server to the thin client (/opt/ltsp/i386/etc/), I am able to log on > the thin client from the server via ssh, using the root password of > the server. It lack of flexibility, but it runs.
You should in no case use the same password as on the server. The "shadow" file can be world-read over NFS, having a crack attempt at a cryptographic string is much easier than trying to exploit some POP3 service or similar for password checking. As for an easy hack to get around this, I usually have only one line in that shadow file (the "root" one, of course) and I use a password that is not in use anywhere else. I do this by setting the "root" password, copying the line from /etc/shadow to /opt/ltsp/i386/etc/shadow, then setting the server root password back to its usual value. BTW for me key file authentication works fine, but on several LTSP setups around I just needed SSH-to-the-client-access once and did not care for the hassle. Hth Anselm Using Tomcat but need to do more? Need to support web services, security? Get stuff done quickly with pre-integrated technology to make your job easier Download IBM WebSphere Application Server v.1.0.1 based on Apache Geronimo http://sel.as-us.falkag.net/sel?cmd=lnk&kid=120709&bid=263057&dat=121642 _____________________________________________________________________ Ltsp-discuss mailing list. To un-subscribe, or change prefs, goto: https://lists.sourceforge.net/lists/listinfo/ltsp-discuss For additional LTSP help, try #ltsp channel on irc.freenode.net
